0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Materials for Electronics Security and Assurance: Navid Asadizanjani, Chengjie Xi, Mark M. Tehranipoor Materials for Electronics Security and Assurance
Navid Asadizanjani, Chengjie Xi, Mark M. Tehranipoor
R4,145 Discovery Miles 41 450 Ships in 12 - 17 working days

Materials for Electronics Security and Assurance reviews the properties of materials that could enable devices that are resistant to tampering and manipulation. It discusses recent advances in materials synthesis and characterization techniques for security applications. Topics addressed include anti-reverse engineering, detection, prevention, track and trace, fingerprinting, obfuscation and how materials could enable these security solutions. The book introduces the opportunities and challenges and provides a clear direction of the requirements for material-based solutions to address electronics security challenges. Materials for Electronics Security and Assurance is suitable for materials scientists and engineers to enable future research directions, current computer and hardware security engineers to enable materials selection, and to inspire cross-collaboration between both communities.

The Hardware Trojan War - Attacks, Myths, and Defenses (Hardcover, 1st ed. 2018): Swarup Bhunia, Mark M. Tehranipoor The Hardware Trojan War - Attacks, Myths, and Defenses (Hardcover, 1st ed. 2018)
Swarup Bhunia, Mark M. Tehranipoor
R5,665 Discovery Miles 56 650 Ships in 10 - 15 working days

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches - both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017): Domenic Forte, Swarup... Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R3,234 Discovery Miles 32 340 Ships in 10 - 15 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017): Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R5,806 Discovery Miles 58 060 Ships in 10 - 15 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Management And Cost Accounting
Colin Drury, Mike Tayles Paperback R1,304 R1,176 Discovery Miles 11 760
Too Hard To Forget
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Complete Snack-A-Chew Iced Dog Biscuits…
R110 R104 Discovery Miles 1 040
Beauty And The Beast - Blu-Ray + DVD
Emma Watson, Dan Stevens, … Blu-ray disc R326 Discovery Miles 3 260
Croxley Create Wood Free Colouring…
R29 Discovery Miles 290
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R263 Discovery Miles 2 630
Bestway Spider-Man Beach Ball (51cm)
R50 R45 Discovery Miles 450
Bostik Clear on Blister Card (25ml)
R33 Discovery Miles 330
Farm Killings In South Africa
Nechama Brodie Paperback R335 R288 Discovery Miles 2 880
Alva 5-Piece Roll-Up BBQ/ Braai Tool Set
R389 R346 Discovery Miles 3 460

 

Partners