Foundations of Hardware IP Protection
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

1125480106
Foundations of Hardware IP Protection
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

139.99 In Stock
Foundations of Hardware IP Protection

Foundations of Hardware IP Protection

Foundations of Hardware IP Protection

Foundations of Hardware IP Protection

Hardcover(1st ed. 2017)

$139.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.


Product Details

ISBN-13: 9783319503783
Publisher: Springer International Publishing
Publication date: 02/08/2017
Edition description: 1st ed. 2017
Pages: 240
Product dimensions: 6.10(w) x 9.25(h) x (d)

About the Author

Lilian Bossuet is an Associate Professor at University of Saint-Etienne, head of the Embedded System Security group and head of the Computer Science departement of the Laboratoire Hubert Curien. His research is in the general area of embedded systems design, including hardware security of embedded systems (data, intellectual property and system security) and reconfigurable hardware design. His active research topics focus on Hardware security, war against illegal IC copy and counterfeiting, IP protection, PUF design and characterization, side channel attacks and countermeasures, TRNG attack, MCryptoPSoC architecture and design, crypto-processor architecture and design, embedded system security, and FPGA security.

Lionel Torres is Professor at the University of Montpellier (Polytech Montpellier engineering school), France. His research activities is part of the microelectronic department of the Laboratory of Informatics, Robotics and Microelectronics of Montpellier (laboratory to the University of Montpellier and the French National Center for Scientic Research (CNRS)). His research interests concern system level architecture, with a specific focus in the security and cryptographic applications and Non-Volatile Computing based on MRAM. He has a PhD from the University of Montpellier in microelectronic design and was at the head of the microelectronic department of LIRMM and he is now deputy head of Polyptych Montpellier and at the Head of the Labex (Laboratory of Excellence) of Digital and Hardware Solutions, Environmental and Organic Life Modeling. He is also co-founder of the Algodone company, company proposing a Digital Right Management solution for silicon IP.

Table of Contents

Digital Right Management for IP Protection.- Turning Electronic Circuits Features into On-Chip Locks.- Logic Modification-Based IP Protection Methods: An Overview and a Proposal.- IP FSM Watermarking.- Side Channel Analysis, an Efficient Ally for IP Protection.- Hardware Obfuscation.- An application of Partial Hardware Reverse Engineering for the Detection of Hardware Trojan.- Linear Complementary Codes: Novel Hardware Trojan Prevention and Detection Approach.- Ultra-Lightweight Implementation in Area of Block Ciphers.- Enhancing Secure Elements – Technology and Architecture.

From the B&N Reads Blog

Customer Reviews