Hardware Supply Chain Security

Hardware Supply Chain Security

Author: Basel Halak

Publisher: Springer Nature

ISBN: 9783030627072

Category: Technology & Engineering

Page: 217

View: 604

Download Now
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.
Hardware Supply Chain Security
Language: en
Pages: 217
Authors: Basel Halak
Categories: Technology & Engineering
Type: BOOK - Published: 2021-02-04 - Publisher: Springer Nature

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of
Machine Learning for Embedded System Security
Language: en
Pages: 160
Authors: Basel Halak
Categories: Technology & Engineering
Type: BOOK - Published: 2022-04-22 - Publisher: Springer Nature

This book comprehensively covers the state-of-the-art security applications of machine learning techniques. The first part explains the emerging solutions for anti-tamper design, IC Counterfeits detection and hardware Trojan identification. It also explains the latest development of deep-learning-based modeling attacks on physically unclonable functions and outlines the design principles of more
Handbook on Securing Cyber-physical Critical Infrastructure
Language: en
Pages: 817
Authors: Sajal K. Das, Krishna Kant, Nan Zhang
Categories: Computers
Type: BOOK - Published: 2012 - Publisher: Elsevier

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well
Security Basics for Computer Architects
Language: en
Pages: 111
Authors: Ruby B. Lee
Categories: Computers
Type: BOOK - Published: 2013-09-01 - Publisher: Morgan & Claypool Publishers

Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer
Fundamentals of Cyber Security
Language: en
Pages: 220
Authors: Mayank Bhushan
Categories: Computers
Type: BOOK - Published: 2017-01-01 - Publisher: BPB Publications

Description-The book has been written in such a way that the concepts are explained in detail, givingadequate emphasis on examples. To make clarity on the topic, diagrams are given extensively throughout the text. Various questions are included that vary widely in type and difficulty to understand the text. This text