LEADER 03496nam 22005775 450 001 9910760263503321 005 20230922182454.0 010 $a3-031-37989-6 024 7 $a10.1007/978-3-031-37989-5 035 $a(MiAaPQ)EBC30751939 035 $a(Au-PeEL)EBL30751939 035 $a(DE-He213)978-3-031-37989-5 035 $a(PPN)272740853 035 $a(EXLCZ)9928283991300041 100 $a20230922d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUnderstanding Logic Locking$b[electronic resource] /$fby Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark Tehranipoor 205 $a1st ed. 2024. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2024. 215 $a1 online resource (385 pages) 311 08$aPrint version: Zamiri Azar, Kimia Understanding Logic Locking Cham : Springer International Publishing AG,c2023 9783031379888 327 $aBasics of VLSI Design -- Basics of VLSI Testing and Debug -- IP Protection in VLSI Design: A Historical View -- Making a Case for Logic Locking -- Fundamentals of Logic Locking -- Infrastructure around Logic Locking -- Impact of Satisfiability Solvers on Logic Locking -- Post-Satisfiability Era: Countermeasures and Threats -- Design-for-Testability and its Impact on Logic Locking -- Emergence of Cutting-edge Technologies on Logic Locking -- Logic Locking in Future IC Supply Chain Environments -- Multilayer Approach to Logic Locking -- A Step-by-Step Guide for Protecting/Locking Your IP -- A Step-by-Step Guide for Security Evaluation of Protected/Locked IP. 330 $aThis book demonstrates the breadth and depth of IP protection through logic locking, considering both attacker/adversary and defender/designer perspectives. The authors draw a semi-chronological picture of the evolution of logic locking during the last decade, gathering and describing all the DO?s and DON?Ts in this approach. They describe simple-to-follow scenarios and guide readers to navigate/identify threat models and design/evaluation flow for further studies. Readers will gain a comprehensive understanding of all fundamentals of logic locking. Covers modern VLSI design, testability and debug, and hardware security threats at different levels of abstraction; Provides a comprehensive overview of logic locking techniques and their applications to hardware security; Covers logic locking from implementation to evaluation, different assumptions, models and abstraction layers. 606 $aElectronic circuit design 606 $aEmbedded computer systems 606 $aElectronic circuits 606 $aElectronics Design and Verification 606 $aEmbedded Systems 606 $aElectronic Circuits and Systems 615 0$aElectronic circuit design. 615 0$aEmbedded computer systems. 615 0$aElectronic circuits. 615 14$aElectronics Design and Verification. 615 24$aEmbedded Systems. 615 24$aElectronic Circuits and Systems. 676 $a005.8 700 $aZamiri Azar$b Kimia$01438734 701 $aMardani Kamali$b Hadi$01438735 701 $aFarahmandi$b Farimah$0977878 701 $aTehranipoor$b Mark$01427902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910760263503321 996 $aUnderstanding Logic Locking$93600370 997 $aUNINA