Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Integrated Circuit Authentication : Hardware Trojans and Counterfeit Detection, PDF eBook

Integrated Circuit Authentication : Hardware Trojans and Counterfeit Detection PDF

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

This book describes techniques to verify the authenticity of integrated circuits (ICs).

It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention.

The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs.

While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions.

Information

Other Formats

Information