Advertisement

Hardware Security and Trust

Design and Deployment of Integrated Circuits in a Threatened Environment

  • Nicolas Sklavos
  • Ricardo Chaves
  • Giorgio Di Natale
  • Francesco Regazzoni
Book

Table of contents

  1. Front Matter
    Pages i-x
  2. João Carlos Resende, Ricardo Chaves
    Pages 1-25
  3. Roberta Piscitelli, Shivam Bhasin, Francesco Regazzoni
    Pages 27-47
  4. Louiza Papachristodoulou, Lejla Batina, Nele Mentens
    Pages 49-76
  5. Jiří Buček, Martin Novotný, Filip Štěpánek
    Pages 77-91
  6. Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu
    Pages 107-126
  7. Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Paul-Henri Pugliesi-Conti
    Pages 127-148
  8. Jelena Milosevic, Francesco Regazzoni, Miroslaw Malek
    Pages 149-167
  9. Paris Kitsos, Nicolas Sklavos, Artemios G. Voyiatzis
    Pages 169-187
  10. Mario Barbareschi
    Pages 189-209
  11. Linus Feiten, Matthias Sauer, Bernd Becker
    Pages 211-235
  12. Mario Barbareschi, Giorgio Di Natale, Lionel Torres
    Pages 237-251
  13. Back Matter
    Pages 253-254

About this book

Introduction

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth.  The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools.  Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.

  • Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization;
  • Describes new methods and algorithms for the identification/detection of hardware trojans;
  • Defines new architectures capable of detecting faults and resisting fault attacks;
  • Establishes a design and synthesis flow to transform a given circuit into a secure design, incorporating counter-measures against fault attacks.

Keywords

Cryptographic Algorithms Cryptographic engineering Cryptographic logic Hardware Trojans Hardware security and trust Physically Unclonable Functions Secure integrated circuits True Random Number Generators

Editors and affiliations

  • Nicolas Sklavos
    • 1
  • Ricardo Chaves
    • 2
  • Giorgio Di Natale
    • 3
  • Francesco Regazzoni
    • 4
  1. 1.Computer & Informatics Engineering DepartmentTechnological Educational Institute of Western GreeceAntirrioGreece
  2. 2.INESC-ID, ISTUniversity of LisbonLisbonPortugal
  3. 3.UMR 5506 - CC 477LIRMM - CNRS / University of MontpellierMontpellierFrance
  4. 4.ALaRI InstituteUniversity of LuganoLuganoSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-44318-8
  • Copyright Information Springer International Publishing Switzerland 2017
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-44316-4
  • Online ISBN 978-3-319-44318-8
  • Buy this book on publisher's site
Industry Sectors
Automotive
Biotechnology
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering