000806850 000__ 04255cam\a2200541Mi\4500 000806850 001__ 806850 000806850 005__ 20230306143840.0 000806850 006__ m\\\\\o\\d\\\\\\\\ 000806850 007__ cr\nn\nnnunnun 000806850 008__ 170104s2017\\\\gw\a\\\\o\\\\\000\0\eng\d 000806850 019__ $$a967938190$$a968312297$$a972951990$$a973122796$$a978425249$$a993637486$$a1001841600$$a1014364975 000806850 020__ $$a9783319490199 000806850 020__ $$a3319490192 000806850 020__ $$z9783319490182 000806850 020__ $$z3319490184 000806850 0247_ $$a10.1007/978-3-319-49019-9$$2doi 000806850 035__ $$aSP(OCoLC)ocn974650730 000806850 035__ $$aSP(OCoLC)974650730$$z(OCoLC)967938190$$z(OCoLC)968312297$$z(OCoLC)972951990$$z(OCoLC)973122796$$z(OCoLC)978425249$$z(OCoLC)993637486$$z(OCoLC)1001841600$$z(OCoLC)1014364975 000806850 037__ $$a4775475$$bProquest Ebook Central 000806850 040__ $$aUPM$$beng$$epn$$cUPM$$dOCLCO$$dYDX$$dOCLCF$$dN$T$$dIDEBK$$dEBLCP$$dGW5XE$$dNJR$$dVT2$$dCOO$$dCNCGM$$dJBG$$dIAD$$dICW$$dICN$$dOCLCQ$$dMERER$$dOCLCQ$$dOCL$$dUAB 000806850 049__ $$aISEA 000806850 050_4 $$aTK7888.4 000806850 08204 $$a621.3815$$223 000806850 24500 $$aHardware Protection through Obfuscation /$$cedited by Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor. 000806850 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint :$$bSpringer,$$c2017. 000806850 300__ $$a1 online resource (xii, 349 pages) :$$billustrations. 000806850 336__ $$atext$$btxt$$2rdacontent 000806850 337__ $$acomputer$$bc$$2rdamedia 000806850 338__ $$aonline resource$$bcr$$2rdacarrier 000806850 347__ $$atext file$$bPDF$$2rda 000806850 504__ $$aIncludes bibliographical references. and index. 000806850 5050_ $$aPart 1: Hardware Obfuscation Preliminaries -- Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation -- VLSI Test and Hardware Security Background for Hardware Obfuscation -- Part 2: Logic-based Hardware Obfuscation -- Logic Encryption -- Gate Camouflaging-based Obfuscation -- Permutation-Based Obfuscation -- Protection of Assets from Scan Chain Vulnerabilities through Obfuscation -- Part 3: Finite State Machine (FSM) Based Hardware Obfuscation -- Active Hardware Metering by Finite State Machine Obfuscation -- State Space Obfuscation and its Application in Hardware Intellectual Property Protection -- Structural Transformation-based Obfuscation -- Part 4: Hardware Obfuscation Based on Emerging Integration Approaches -- Part IV Hardware Obfuscation Based on Emerging Integration Approaches -- Split Manufacturing -- Obfuscated Built-in Self Authentication -- 3D/2.5D IC based Obfuscation -- Part 5: Other Hardware Obfuscation Building Blocks -- Obfuscation and Encryption for Securing Semiconductor Supply Chain. 000806850 506__ $$aAccess limited to authorized users. 000806850 520__ $$aThis book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation. 000806850 650_0 $$aEngineering. 000806850 650_0 $$aMicroprocessors. 000806850 650_0 $$aData encryption (Computer science) 000806850 650_0 $$aElectronics. 000806850 650_0 $$aMicroelectronics. 000806850 650_0 $$aElectronic circuits. 000806850 7001_ $$aForte, Domenic,$$eeditor. 000806850 7001_ $$aBhunia, Swarup,$$eeditor. 000806850 7001_ $$aTehranipoor, Mark M.,$$eeditor. 000806850 77608 $$iPrint version:$$z9783319490182 000806850 852__ $$bebk 000806850 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-49019-9$$zOnline Access$$91397441.1 000806850 909CO $$ooai:library.usi.edu:806850$$pGLOBAL_SET 000806850 980__ $$aEBOOK 000806850 980__ $$aBIB 000806850 982__ $$aEbook 000806850 983__ $$aOnline 000806850 994__ $$a92$$bISE