Skip to main content

Hardware Supply Chain Security

Threat Modelling, Emerging Attacks and Countermeasures

  • Book
  • © 2021

Overview

  • Presents a new threat modelling approach, developed specifically for the hardware supply chain.
  • Provides a systematic security analysis of the IC supply chain, which includes the latest attacks, countermeasures and security validation techniques.
  • Includes a detailed case study of new forms of threats that combine multiple attack vectors, supported by FPGA demonstration and experimental analysis.
  • Provides an in-depth discussion of emerging solutions to protect lightweight electronics devices from counterfeiting.
  • Describes state-of-the-art machine learning techniques that allow the detection of anomalous behaviors of electronic systems.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (6 chapters)

  1. Threat Modelling of Hardware Supply Chain

  2. Emerging Hardware-Based Security Attacks and Countermeasures

  3. Anomaly Detection in Embedded Systems

Keywords

About this book

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new  type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. 

Editors and Affiliations

  • Electronics and Computer Science School, University of Southampton, Southampton, UK

    Basel Halak

About the editor

Dr Basel Halak is the director of the embedded systems and IoT program at the University of Southampton, a visiting scholar at the Technical University of Kaiserslautern, a visiting professor at the Kazakh-British Technical University, a fellow of the royal academy of engineering, a national teaching fellow of Advance HE in the UK, and a senior fellow of the higher education academy. He has written over 80-refereed conference and journal papers, and authored two books, including the first textbook on Physically Unclonable Functions. His research expertise include evaluation of security of hardware devices, development of appropriate countermeasures, the development of mathematical formalisms of reliability issues in CMOS circuits (e.g. crosstalk, radiation, ageing), and the use of fault tolerance techniques to improve the robustness of electronics systems against such issues.. Dr Halak lectures on digital design, Secure Hardware and Cryptography.  He is also leading European Masters in Embedded Computing Systems (EMECS) , a two year course run in collaboration with Kaiserslautern University in Germany and the Norwegian University of Science and Technology in Trondheim (electronics and communication). Dr Halak serves on several technical program committees such as HOST, IEEE DATE, IVSW, ICCCA, ICCCS, MTV and EWME. He is an associate editor of IEEE access and an editor of the IET circuit devices and system journal. He is also a member of the hardware security-working group of the World Wide Web Consortium (W3C).


Bibliographic Information

  • Book Title: Hardware Supply Chain Security

  • Book Subtitle: Threat Modelling, Emerging Attacks and Countermeasures

  • Editors: Basel Halak

  • DOI: https://doi.org/10.1007/978-3-030-62707-2

  • Publisher: Springer Cham

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021

  • Hardcover ISBN: 978-3-030-62706-5Published: 05 February 2021

  • Softcover ISBN: 978-3-030-62709-6Published: 05 February 2022

  • eBook ISBN: 978-3-030-62707-2Published: 04 February 2021

  • Edition Number: 1

  • Number of Pages: XV, 217

  • Number of Illustrations: 2 b/w illustrations

  • Topics: Circuits and Systems, Cyber-physical systems, IoT, Professional Computing, Processor Architectures

Publish with us