Skip to main content
Book cover

Hardware Security and Trust

Design and Deployment of Integrated Circuits in a Threatened Environment

  • Book
  • © 2017

Overview

  • Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization;
  • Describes new methods and algorithms for the identification/detection of hardware trojans;
  • Defines new architectures capable of detecting faults and resisting fault attacks;
  • Establishes a design and synthesis flow to transform a given circuit into a secure design, incorporating counter-measures against fault attacks.
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (12 chapters)

Keywords

About this book

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.

Editors and Affiliations

  • Computer & Informatics Engineering Department, Technological Educational Institute of Western Greece, Antirrio, Greece

    Nicolas Sklavos

  • INESC-ID, IST, University of Lisbon, Lisbon, Portugal

    Ricardo Chaves

  • UMR 5506 - CC 477, LIRMM - CNRS / University of Montpellier, Montpellier, France

    Giorgio Di Natale

  • ALaRI Institute, University of Lugano, Lugano, Switzerland

    Francesco Regazzoni

About the editors

Nicolas Sklavos is an Associate Professor, with the Computer Engineering & Informatics Department, Polytechnic School, University of Patras, Hellas.

He holds an award for his PhD thesis on “VLSI Designs of Wireless Communications Security Systems”, from IFIP VLSI SOC, Germany, 2003. He has been awarded with a post-doctoral research scholarship, from the National Scholarship Foundation.

He has participated in a great number of European and National projects, with both research & management activities, funding by the European Commission or/and National resources.

He also acts as a reviewer and evaluator for both European Commission Project Calls, and National Project Calls of several countries.

He is Associate Editor of the Electrical & Computer Engineering Journal, Hindawi and Cryptography, ΜDPI Publisher. He was the Editor in Chief of Information Security Journal: a Global Perspective, Taylor Francis Group, from 2011 to 2014. He also served as Associate Editor of IEEE Transactions of Latin America, and Computers & Electrical Engineering Journal, Elsevier and Information Security Journal: a Global Perspective, Taylor Francis Group. He has been invited as Guest Editor of Special Issues of several publishers. He has been awarded as Top Associated Editor for 2010 and 2011, from Computers & Electrical Engineering Journal, Elsevier.

He is an IEEE, Senior Member. From 2007 to 2014, he was the Council’s Chair of IEEE Greece Young Professionals.

He is an Associated Member of European Network of Excellence (HiPEAC). He is a member of the IFIP Working Group 11.3 on Data and Application Security and Privacy. He is also a member of International Association for Cryptologic Research (IACR), the Technical Chamber of Greece, and the Greek Electrical Engineering Society.

He has participated in the committees of up to 300 conferences organized by IEEE, ACM, IFIP, as General, Program, Publication, etc, Chair, and with other roles.

He has also authored/co-authored up to 250 scientific articles, published in journals, conferences, both books, books chapters, tutorials and technical reports, in the areas of his research. He has been invited as keynote speaker to several international conferences, workshops, summer schools etc.

Recently, the results of his research, have received up to 1700 citations, in the scientific and technical literature.

Bibliographic Information

  • Book Title: Hardware Security and Trust

  • Book Subtitle: Design and Deployment of Integrated Circuits in a Threatened Environment

  • Editors: Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni

  • DOI: https://doi.org/10.1007/978-3-319-44318-8

  • Publisher: Springer Cham

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer International Publishing Switzerland 2017

  • Hardcover ISBN: 978-3-319-44316-4Published: 19 January 2017

  • Softcover ISBN: 978-3-319-83037-7Published: 29 April 2018

  • eBook ISBN: 978-3-319-44318-8Published: 11 January 2017

  • Edition Number: 1

  • Number of Pages: X, 254

  • Number of Illustrations: 52 b/w illustrations, 47 illustrations in colour

  • Topics: Circuits and Systems, Processor Architectures, Electronics and Microelectronics, Instrumentation

Publish with us