Authors:
- Provides a single-source reference to hardware Trojans and counterfeit detection in integrated circuits
- Equips designers with architecture-level solutions to improve detection and prevention of hardware Trojans and counterfeits
- Enables a strategy of silicon design authentication to verify the trustworthiness manufactured chips, validating the chip’s conformance with the original functional and performance specifications
- Includes supplementary material: sn.pub/extras
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (11 chapters)
-
Front Matter
-
Back Matter
About this book
Authors and Affiliations
-
ECE Department, University of Connecticut, Storrs, USA
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
Bibliographic Information
Book Title: Integrated Circuit Authentication
Book Subtitle: Hardware Trojans and Counterfeit Detection
Authors: Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
DOI: https://doi.org/10.1007/978-3-319-00816-5
Publisher: Springer Cham
eBook Packages: Engineering, Engineering (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Hardcover ISBN: 978-3-319-00815-8Published: 16 October 2013
Softcover ISBN: 978-3-319-37498-7Published: 23 August 2016
eBook ISBN: 978-3-319-00816-5Published: 04 October 2013
Edition Number: 1
Number of Pages: XVI, 222
Number of Illustrations: 55 b/w illustrations, 65 illustrations in colour
Topics: Circuits and Systems, Processor Architectures, Electronic Circuits and Devices