Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
Provides a comprehensive introduction to logic locking, suitable for beginners and experts.
Offers a novel perspective on hardware Trojan classification and its interplay with logic locking.
Introduces scaling techniques to design and apply logic locking
A subtle change that leads to disastrous consequences—hardware Trojans undoubtedly pose one of the greatest security threats to the modern age. How to protect hardware against these malicious modifications? One potential solution hides within logic locking a prominent hardware obfuscation technique. In this book, we take a step-by-step approach to understanding logic locking, from its fundamental mechanics, over the implementation in software, down to an in-depth analysis of security properties in the age of machine learning. This book can be used as a reference for beginners and experts alike who wish to dive into the world of logic locking, thereby having a holistic view of the entire infrastructure required to design, evaluate, and deploy modern locking policies