001467965 000__ 03754cam\\2200637\i\4500 001467965 001__ 1467965 001467965 003__ OCoLC 001467965 005__ 20230707003348.0 001467965 006__ m\\\\\o\\d\\\\\\\\ 001467965 007__ cr\cn\nnnunnun 001467965 008__ 230517t20232023sz\\\\\\ob\\\\001\0\eng\d 001467965 019__ $$a1378931294$$a1382237760 001467965 020__ $$a9783031268960$$q(electronic bk.) 001467965 020__ $$a3031268962$$q(electronic bk.) 001467965 020__ $$z9783031268953 001467965 020__ $$z3031268954 001467965 0247_ $$a10.1007/978-3-031-26896-0$$2doi 001467965 035__ $$aSP(OCoLC)1379235628 001467965 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dYDX 001467965 049__ $$aISEA 001467965 050_4 $$aT385 001467965 08204 $$a620.00420285$$223/eng/20230518 001467965 1001_ $$aFarahmandi, Farimah,$$eauthor. 001467965 24510 $$aCAD for hardware security /$$cFarimah Farahmandi, M. Sazadur Rahman, Sree Ranjani Rajendran and Mark Tehranipoor. 001467965 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2023] 001467965 264_4 $$c©2023 001467965 300__ $$a1 online resource. 001467965 336__ $$atext$$btxt$$2rdacontent 001467965 337__ $$acomputer$$bc$$2rdamedia 001467965 338__ $$aonline resource$$bcr$$2rdacarrier 001467965 504__ $$aIncludes bibliographical references and index. 001467965 5050_ $$aIntroduction -- CAD for Information Leakage Assessment -- CAD for Power Side Channel Leakage Assessment -- CAD for Electromagnetic Radiation Leakage Assessment -- CAD for Timing Leakage Assessment -- CAD for Fault Injection Attack Analysis -- CAD for Obfuscation -- CAD for Watermarking -- CAD for HW Metering -- CAD for Detecting HLS Vulnerabilities -- CAD for Counterfeit Detection and Prevention -- CAD for Trojan Detection and Prevention -- CAD for Physical Assurance -- CAD for Anti-Probing -- CAD for Formal Security Verification -- CAD for Reverse Engineering. 001467965 506__ $$aAccess limited to authorized users. 001467965 520__ $$aThis book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools. Authors are from CAD developers, IP developers, SOC designers as well as SoC verification experts. Readers will gain a comprehensive understanding of SoC security vulnerabilities and how to overcome them, through an efficient combination of proactive countermeasures and a wide variety of CAD solutions. Offers techniques to protect hardware designs from a variety of vulnerabilities using CAD; Provides a comprehensive introduction to current SoC security vulnerabilities at different levels of abstraction; Discusses CAD-based approaches and their application to SoC security issues at various levels of design abstraction. 001467965 588__ $$aOnline resource; title from PDF title page (EBSCO, viewed May 18, 2023). 001467965 650_0 $$aComputer-aided design. 001467965 650_0 $$aComputer security. 001467965 655_0 $$aElectronic books. 001467965 7001_ $$aRahman, M. Sazadur,$$eauthor. 001467965 7001_ $$aRajendran, Sree Ranjani,$$eauthor. 001467965 7001_ $$aTehranipoor, Mohammad H.,$$d1974-$$eauthor. 001467965 77608 $$iPrint version: $$z3031268954$$z9783031268953$$w(OCoLC)1365056439 001467965 852__ $$bebk 001467965 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-26896-0$$zOnline Access$$91397441.1 001467965 909CO $$ooai:library.usi.edu:1467965$$pGLOBAL_SET 001467965 980__ $$aBIB 001467965 980__ $$aEBOOK 001467965 982__ $$aEbook 001467965 983__ $$aOnline 001467965 994__ $$a92$$bISE