Advertisement

Integrated Circuit Authentication

Hardware Trojans and Counterfeit Detection

  • Mohammad Tehranipoor
  • Hassan Salmani
  • Xuehui Zhang

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 1-18
  3. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 19-30
  4. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 31-38
  5. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 39-67
  6. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 69-90
  7. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 91-124
  8. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 125-145
  9. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 147-160
  10. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 161-178
  11. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 179-205
  12. Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
    Pages 207-220
  13. Back Matter
    Pages 221-222

About this book

Introduction

This book provides readers with a comprehensive introduction to hardware Trojans.  The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products.

 

·         Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle;

·         Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing;

·         Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention;

·         Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion.

Keywords

Counterfeit Integrated Circuit Hardware Security and Trust Hardware Trojan Integrated Circuit Authentication Integrated Circuit Testing Silicon Design Authentication

Authors and affiliations

  • Mohammad Tehranipoor
    • 1
  • Hassan Salmani
    • 2
  • Xuehui Zhang
    • 3
  1. 1.ECE DepartmentUniversity of ConnecticutStorrsUSA
  2. 2.ECE DepartmentUniversity of ConnecticutStorrsUSA
  3. 3.ECE DepartmentUniversity of ConnecticutStorrsUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-00816-5
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-00815-8
  • Online ISBN 978-3-319-00816-5
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering