- Hardcover: 427 pages
- Publisher: Springer; 2012 edition (September 21, 2011)
- Language: English
- ISBN-10: 1441980792
- ISBN-13: 978-1441980793
- Product Dimensions: 6.1 x 0.9 x 9.2 inches
- Shipping Weight: 1.7 pounds (View shipping rates and policies)
- Average Customer Review: 1 customer review
- Amazon Best Sellers Rank: #680,822 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Introduction to Hardware Security and Trust 2012th Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who bought this item also bought
From the reviews:
“Editors Tehranipoor and Wand help fill this important gap with their book on the security of electronic devices and systems … . The text begins with an introduction to very-large-scale integration (VLSI) testing and hardware implementation of hash functions. … Overall, this book represents an important contribution to the cyber security body of knowledge, providing a comprehensive introduction to hardware security and trust. I consider it highly relevant and recommend it.” (Alessandro Berni, ACM Computing Reviews, June, 2012)
From the Back Cover
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society’s microelectronic-supported infrastructures.
- Provides a comprehensive introduction to hardware security and trust;
- Includes coverage at the circuit and systems levels, with applications to design and implementation;
- Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attack and countermeasures for smart cards.