TY - GEN N2 - This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more. Discusses attacks including side-channel, fault-injection, optical probing, PUF, TRNGs, hardware Trojans and more Provides hands-on experiments, with step-by-step description, for attacks and countermeasure mechanisms Enables design of secure, reliable, and trustworthy hardware, via hands-on experience. DO - 10.1007/978-3-031-31034-8 DO - doi AB - This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more. Discusses attacks including side-channel, fault-injection, optical probing, PUF, TRNGs, hardware Trojans and more Provides hands-on experiments, with step-by-step description, for attacks and countermeasure mechanisms Enables design of secure, reliable, and trustworthy hardware, via hands-on experience. T1 - Hardware security training, hands-on! / AU - Tehranipoor, Mohammad H., AU - Anandakumar, N. Nalla, AU - Farahmandi, Farimah, CN - QA76.9.A25 ID - 1470292 KW - Computer security SN - 9783031310348 SN - 3031310349 TI - Hardware security training, hands-on! / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-31034-8 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-31034-8 ER -