1.

Record Nr.

UNINA9910726295403321

Autore

Farahmandi Farimah

Titolo

CAD for Hardware Security / / by Farimah Farahmandi, M. Sazadur Rahman, Sree Ranjani Rajendran, Mark Tehranipoor

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023

ISBN

3-031-26896-2

Edizione

[1st ed. 2023.]

Descrizione fisica

1 online resource (415 pages)

Disciplina

005.8

Soggetti

Electronic circuits

Internet of things

Microprocessors

Computer architecture

Electronic Circuits and Systems

Internet of Things

Processor Architectures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Introduction -- CAD for Information Leakage Assessment -- CAD for Power Side Channel Leakage Assessment -- CAD for Electromagnetic Radiation Leakage Assessment -- CAD for Timing Leakage Assessment -- CAD for Fault Injection Attack Analysis -- CAD for Obfuscation -- CAD for Watermarking -- CAD for HW Metering -- CAD for Detecting HLS Vulnerabilities -- CAD for Counterfeit Detection and Prevention -- CAD for Trojan Detection and Prevention -- CAD for Physical Assurance -- CAD for Anti-Probing -- CAD for Formal Security Verification -- CAD for Reverse Engineering.

Sommario/riassunto

This book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools. Authors are from CAD developers, IP developers, SOC designers as well as SoC verification experts. Readers will gain a comprehensive understanding of SoC security vulnerabilities and how to overcome them, through an efficient combination of proactive countermeasures and a wide variety of CAD



solutions. Offers techniques to protect hardware designs from a variety of vulnerabilities using CAD; Provides a comprehensive introduction to current SoC security vulnerabilities at different levels of abstraction; Discusses CAD-based approaches and their application to SoC security issues at various levels of design abstraction.