0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Materials for Electronics Security and Assurance: Navid Asadizanjani, Chengjie Xi, Mark M. Tehranipoor Materials for Electronics Security and Assurance
Navid Asadizanjani, Chengjie Xi, Mark M. Tehranipoor
R4,145 Discovery Miles 41 450 Ships in 12 - 17 working days

Materials for Electronics Security and Assurance reviews the properties of materials that could enable devices that are resistant to tampering and manipulation. It discusses recent advances in materials synthesis and characterization techniques for security applications. Topics addressed include anti-reverse engineering, detection, prevention, track and trace, fingerprinting, obfuscation and how materials could enable these security solutions. The book introduces the opportunities and challenges and provides a clear direction of the requirements for material-based solutions to address electronics security challenges. Materials for Electronics Security and Assurance is suitable for materials scientists and engineers to enable future research directions, current computer and hardware security engineers to enable materials selection, and to inspire cross-collaboration between both communities.

The Hardware Trojan War - Attacks, Myths, and Defenses (Hardcover, 1st ed. 2018): Swarup Bhunia, Mark M. Tehranipoor The Hardware Trojan War - Attacks, Myths, and Defenses (Hardcover, 1st ed. 2018)
Swarup Bhunia, Mark M. Tehranipoor
R5,665 Discovery Miles 56 650 Ships in 10 - 15 working days

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches - both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017): Domenic Forte, Swarup... Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R3,234 Discovery Miles 32 340 Ships in 10 - 15 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017): Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R5,806 Discovery Miles 58 060 Ships in 10 - 15 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Lion King 3 - Hakuna Matata
Nathan Lane, Ernie Sabella, … Blu-ray disc  (1)
R41 Discovery Miles 410
Bostik Glue Stick (40g)
R44 Discovery Miles 440
Shield Air Conditioner Treatment Fogger…
R39 R35 Discovery Miles 350
Bostik Wax Twisters (12 Pack)
R61 R56 Discovery Miles 560
Cricut Joy Machine
 (6)
R4,854 Discovery Miles 48 540
Complete Snack-A-Chew Iced Dog Biscuits…
R110 R104 Discovery Miles 1 040
LEGO 2K Drive
R1,199 R399 Discovery Miles 3 990
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger Blu-ray disc  (1)
R79 Discovery Miles 790
Complete Cat Food (7kg)
 (1)
R405 Discovery Miles 4 050
Mellerware Swiss - Plastic Floor Fan…
R368 Discovery Miles 3 680

 

Partners