Torrent details for "Tehranipoor M. Hardware Security Primitives 2023 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
8.58 MB
Info Hash:
88ac0f5a9379cfc81a6cefd845fe02a07655574e
Added By:
Added:  
18-12-2022 14:53
Views:
124
Health:
Seeds:
0
Leechers:
0
Completed:
229
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware.
In this modern world of highly connected electronic devices and online cloud data storage, a user can access any sort of information anytime and anywhere with the help of smart devices. Besides storing users’ personal information, these devices also store proprietary data such as encryption keys, soft intellectual property, and confidential information to perform artificial intelligence specialized tasks such as an autopilot for self-driving cars. The presence of confidential and intellectual information on hardware devices makes them a lucrative target for hackers’ attacks. An adversary can compromise the security of these hardware devices, hijack information to achieve financial gains, and steal intellectual property to perform reverse engineering for manufacturing counterfeit cloned devices. Besides these cloned counterfeits, recycled and refurbished devices can be sold as new ones. These recycled devices cause a revenue loss to manufacturers and pose safety issues due to their reduced life span and reliability. Hence, these devices need to be secured from these attacks. One of the possible solutions to ensure hardware security is to physically embed secure circuits for device authentication, random passkey generation, and anti-counterfeiting detection. These circuits have a unique signature as analogous to human retinal/finger imprints and DNA. These signatures are random, hard to predict, and nearly impossible to clone. Hence, it prevents unauthorized access to data and ensures reliable hardware platforms for secure communications, device authentication, and defense against many software and hardware risks and attacks. Physically unclonable functions (PUFs) and True Random Number Generators (TRNGs) are widely used as hardware security primitives to secure hardware devices and counterfeit detection. Therefore, it is necessary to understand their types, applications, and functions for securing hardware devices.
This book will be a comprehensive reference for circuits and systems designers, graduate students, academics, and industrial researchers interested in hardware security and trust. It will include contributions from experts and researchers in the field of secure hardware design and assurance. In addition, this book will cover various security primitives, design considerations for a secure SoC design, and their applications in counterfeit hardware detection.
This volume will provide the most comprehensive coverage of various hardware security primitives, their roles in hardware assurance and supply chain from the integrated circuit to the package level. Chapters 1–7 cover different types of physical unclonable functions (PUFs), which are fundamental components to hardware security. Chapter 8 discusses true random number generators (TRNSs) developed by exploiting the entropy in hardware manufacturing. Chapter 9 discusses hardware security primitives developed using emerging technologies other than CMOS, such as carbon nanotubes. Chapters 10 and 11 present various techniques for hardware camouflaging and watermarking, respectively. Chapter 12 covers various lightweight cryptographic algorithms that can be alternatives to PUFs on resource-constraint devices. Chapter 13 discusses growing virtual proof of reality to provide security based on blockchain and smart contracts. Chapter 14 covers analog security, usually neglected during hardware security discussions. Chapters 15, 16, and 17 cover various IC and package level methods for tempering, counterfeit, and recycled detection. Finally, Chaps. 18 and 19 cover various side-channel and fault-injection resistant primitives for security in cryptographic hardware.
Intrinsic Racetrack PUF
Intrinsic-Transient PUF
Direct Intrinsic Characterization PUF
Volatile Memory-Based PUF
Extrinsic Direct Characterization PUF
Hybrid Extrinsic Radio Frequency PUF
Optical PUF
True Random Number Generators
Hardware Security Primitives Based on Emerging Technologies
Hardware Camouflaging in Integrated Circuits
Embedded Watermarks
Lightweight Cryptography
Virtual Proof of Reality
Analog Security
Tamper Detection
Counterfeit and Recycled IC Detection
Package-Level Counterfeit Detection and Avoidance
Side-Channel Protection in Cryptographic Hardware
Fault Injection Resistant Cryptographic Hardware

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes