000825518 000__ 03539cam\a2200529Mi\4500 000825518 001__ 825518 000825518 005__ 20230306144220.0 000825518 006__ m\\\\\o\\d\\\\\\\\ 000825518 007__ cr\nn\nnnunnun 000825518 008__ 171129s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000825518 019__ $$a1013819557$$a1024241307 000825518 020__ $$a9783319685113 000825518 020__ $$a3319685112 000825518 020__ $$z3319685104 000825518 020__ $$z9783319685106 000825518 0247_ $$a10.1007/978-3-319-68511-3$$2doi 000825518 035__ $$aSP(OCoLC)on1017801281 000825518 035__ $$aSP(OCoLC)1017801281$$z(OCoLC)1013819557$$z(OCoLC)1024241307 000825518 040__ $$aAZU$$beng$$cAZU$$dOCLCO$$dYDX$$dN$T$$dGW5XE$$dOCLCA$$dOCLCF$$dOCL$$dUWO 000825518 049__ $$aISEA 000825518 050_4 $$aTK7888.4 000825518 08204 $$a621.3815$$223 000825518 24504 $$aThe Hardware Trojan War :$$bAttacks, Myths, and Defenses /$$cedited by Swarup Bhunia, Mark M. Tehranipoor. 000825518 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000825518 300__ $$a1 online resource (viii, 389 pages) :$$billustrations. 000825518 336__ $$atext$$btxt$$2rdacontent 000825518 337__ $$acomputer$$bc$$2rdamedia 000825518 338__ $$aonline resource$$bcr$$2rdacarrier 000825518 347__ $$atext file$$bPDF$$2rda 000825518 504__ $$aIncludes bibliographical references. 000825518 5050_ $$aPart I. Hardware Trojan Preliminaries -- Chapter 1.Introduction -- Chapter 2.Introduction to Hardware Trojans -- Part II. Hardware Trojan attacks: Threat Analysis -- Chapter 3.Hardware Trojan Attacks in SoC and NoC -- Chapter 4. Hardware IP Trust -- Chapter 5. Hardware Trojans in Analog, Mixed-Signal and RF ICs -- Chapter 6. Hardware Trojans and Piracy of PCBs -- Part III. Detection-Logic Testing -- Chapter 7. Logic Testing for Hardware Trojan Detection -- Chapter 8. Formal Approaches to Hardware Trust Verification -- Chapter 9. Golden-free Trojan Detection -- Part IV-Detection-Side Channel analysis -- Chapter 10. Detecting Hardware Trojans using Delay Analysis -- Chapter 11. Reverse-Engineering Based Hardware Trojan Detection -- Part VI. Emerging Trent, Inductrial Practices, New Attacks -- Chapter 15. Hardware Trust in Industrial SoC Designs: Practice and Challenges -- Chapter 16.Conclusion and Future Work. 000825518 506__ $$aAccess limited to authorized users. 000825518 520__ $$aThis book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches - both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways. 000825518 650_0 $$aEngineering. 000825518 650_0 $$aComputer software$$xReusability. 000825518 650_0 $$aComputer security. 000825518 650_0 $$aData encryption (Computer science) 000825518 650_0 $$aElectronics. 000825518 650_0 $$aMicroelectronics. 000825518 650_0 $$aElectronic circuits. 000825518 7001_ $$aBhunia, Swarup.$$eeditor. 000825518 7001_ $$aTehranipoor, Mark M.$$eeditor. 000825518 77608 $$iPrint version: $$z9783319685106 000825518 852__ $$bebk 000825518 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-68511-3$$zOnline Access$$91397441.1 000825518 909CO $$ooai:library.usi.edu:825518$$pGLOBAL_SET 000825518 980__ $$aEBOOK 000825518 980__ $$aBIB 000825518 982__ $$aEbook 000825518 983__ $$aOnline 000825518 994__ $$a92$$bISE