Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware.
In this modern world of highly connected electronic devices and online cloud data storage, a user can access any sort of information anytime and anywhere with the help of smart devices. Besides storing users’ personal information, these devices also store proprietary data such as encryption keys, soft intellectual property, and confidential information to perform artificial intelligence specialized tasks such as an autopilot for self-driving cars. The presence of confidential and intellectual information on hardware devices makes them a lucrative target for hackers’ attacks. An adversary can compromise the security of these hardware devices, hijack information to achieve financial gains, and steal intellectual property to perform reverse engineering for manufacturing counterfeit cloned devices. Besides these cloned counterfeits, recycled and refurbished devices can be sold as new ones. These recycled devices cause a revenue loss to manufacturers and pose safety issues due to their reduced life span and reliability. Hence, these devices need to be secured from these attacks. One of the possible solutions to ensure hardware security is to physically embed secure circuits for device authentication, random passkey generation, and anti-counterfeiting detection. These circuits have a unique signature as analogous to human retinal/finger imprints and DNA. These signatures are random, hard to predict, and nearly impossible to clone. Hence, it prevents unauthorized access to data and ensures reliable hardware platforms for secure communications, device authentication, and defense against many software and hardware risks and attacks. Physically unclonable functions (PUFs) and True Random Number Generators (TRNGs) are widely used as hardware security primitives to secure hardware devices and counterfeit detection. Therefore, it is necessary to understand their types, applications, and functions for securing hardware devices.
This book will be a comprehensive reference for circuits and systems designers, graduate students, academics, and industrial researchers interested in hardware security and trust. It will include contributions from experts and researchers in the field of secure hardware design and assurance. In addition, this book will cover various security primitives, design considerations for a secure SoC design, and their applications in counterfeit hardware detection.
This volume will provide the most comprehensive coverage of various hardware security primitives, their roles in hardware assurance and supply chain from the integrated circuit to the package level. Chapters 1–7 cover different types of physical unclonable functions (PUFs), which are fundamental components to hardware security. Chapter 8 discusses true random number generators (TRNSs) developed by exploiting the entropy in hardware manufacturing. Chapter 9 discusses hardware security primitives developed using emerging technologies other than CMOS, such as carbon nanotubes. Chapters 10 and 11 present various techniques for hardware camouflaging and watermarking, respectively. Chapter 12 covers various lightweight cryptographic algorithms that can be alternatives to PUFs on resource-constraint devices. Chapter 13 discusses growing virtual proof of reality to provide security based on blockchain and smart contracts. Chapter 14 covers analog security, usually neglected during hardware security discussions. Chapters 15, 16, and 17 cover various IC and package level methods for tempering, counterfeit, and recycled detection. Finally, Chaps. 18 and 19 cover various side-channel and fault-injection resistant primitives for security in cryptographic hardware.
Intrinsic Racetrack PUF
Intrinsic-Transient PUF
Direct Intrinsic Characterization PUF
Volatile Memory-Based PUF
Extrinsic Direct Characterization PUF
Hybrid Extrinsic Radio Frequency PUF
Optical PUF
True Random Number Generators
Hardware Security Primitives Based on Emerging Technologies
Hardware Camouflaging in Integrated Circuits
Embedded Watermarks
Lightweight Cryptography
Virtual Proof of Reality
Analog Security
Tamper Detection
Counterfeit and Recycled IC Detection
Package-Level Counterfeit Detection and Avoidance
Side-Channel Protection in Cryptographic Hardware
Fault Injection Resistant Cryptographic Hardware