Springer celebrates 175 years of publishing excellence! Join us >>

Integrated Circuit Authentication

Hardware Trojans and Counterfeit Detection

Authors: Tehranipoor, Mohammad, Salmani, Hassan, Zhang, Xuehui

  • Provides a single-source reference to hardware Trojans and counterfeit detection in integrated circuits
  • Equips designers with architecture-level solutions to improve detection and prevention of hardware Trojans and counterfeits
  • Enables a strategy of silicon design authentication to verify the trustworthiness manufactured chips, validating the chip’s conformance with the original functional and performance specifications
see more benefits

Buy this book

eBook $89.00
price for USA (gross)
  • ISBN 978-3-319-00816-5
  • Digitally watermarked, DRM-free
  • Included format: PDF, EPUB
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Hardcover $119.00
price for USA
  • ISBN 978-3-319-00815-8
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Softcover $119.00
price for USA
  • ISBN 978-3-319-37498-7
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Rent the ebook  
  • Rental duration: 1 or 6 month
  • low-cost access
  • online reader with highlighting and note-making option
  • can be used across all devices
About this book

This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions. 

Table of contents (11 chapters)

  • Introduction

    Tehranipoor, Mohammad (et al.)

    Pages 1-18

  • Hardware Trojan Detection: Untrusted Third-Party IP Cores

    Tehranipoor, Mohammad (et al.)

    Pages 19-30

  • Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits

    Tehranipoor, Mohammad (et al.)

    Pages 31-38

  • Design for Hardware Trust: Dummy Scan Flip-Flop Insertion

    Tehranipoor, Mohammad (et al.)

    Pages 39-67

  • Design for Hardware Trust: Layout-Aware Scan Cell Reordering

    Tehranipoor, Mohammad (et al.)

    Pages 69-90

Buy this book

eBook $89.00
price for USA (gross)
  • ISBN 978-3-319-00816-5
  • Digitally watermarked, DRM-free
  • Included format: PDF, EPUB
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Hardcover $119.00
price for USA
  • ISBN 978-3-319-00815-8
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Softcover $119.00
price for USA
  • ISBN 978-3-319-37498-7
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Rent the ebook  
  • Rental duration: 1 or 6 month
  • low-cost access
  • online reader with highlighting and note-making option
  • can be used across all devices
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Integrated Circuit Authentication
Book Subtitle
Hardware Trojans and Counterfeit Detection
Authors
Copyright
2014
Publisher
Springer International Publishing
Copyright Holder
Springer International Publishing Switzerland
Distribution Rights
Distribution rights for India: Delhi Book Store, New Delhi, India
eBook ISBN
978-3-319-00816-5
DOI
10.1007/978-3-319-00816-5
Hardcover ISBN
978-3-319-00815-8
Softcover ISBN
978-3-319-37498-7
Edition Number
1
Number of Pages
XVI, 222
Number of Illustrations and Tables
55 b/w illustrations, 65 illustrations in colour
Topics