0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Counterfeit Integrated Circuits - Detection and Avoidance (Hardcover): Mark (Mohammad) Tehranipoor, Ujjwal Guin, Domenic Forte Counterfeit Integrated Circuits - Detection and Avoidance (Hardcover)
Mark (Mohammad) Tehranipoor, Ujjwal Guin, Domenic Forte
R4,370 Discovery Miles 43 700 Ships in 12 - 17 working days

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat. * Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; * Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; * Provides step-by-step solutions for detecting different types of counterfeit ICs; * Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.

Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017): Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor Hardware Protection through Obfuscation (Hardcover, 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R4,410 Discovery Miles 44 100 Ships in 12 - 17 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Security Opportunities in Nano Devices and Emerging Technologies (Paperback): Mark Tehranipoor, Domenic Forte, Swarup Bhunia,... Security Opportunities in Nano Devices and Emerging Technologies (Paperback)
Mark Tehranipoor, Domenic Forte, Swarup Bhunia, Garrett Rose
R1,322 Discovery Miles 13 220 Ships in 12 - 17 working days

The research community lacks both the capability to explain the effectiveness of existing techniques and the metrics to predict the security properties and vulnerabilities of the next generation of nano-devices and systems. This book provides in-depth viewpoints on security issues and explains how nano devices and their unique properties can address the opportunities and challenges of the security community, manufacturers, system integrators, and end users. This book elevates security as a fundamental design parameter, transforming the way new nano-devices are developed. Part 1 focuses on nano devices and building security primitives. Part 2 focuses on emerging technologies and integrations.

Security Opportunities in Nano Devices and Emerging Technologies (Hardcover): Mark Tehranipoor, Domenic Forte, Swarup Bhunia,... Security Opportunities in Nano Devices and Emerging Technologies (Hardcover)
Mark Tehranipoor, Domenic Forte, Swarup Bhunia, Garrett Rose
R3,768 Discovery Miles 37 680 Ships in 12 - 17 working days

The research community lacks both the capability to explain the effectiveness of existing techniques and the metrics to predict the security properties and vulnerabilities of the next generation of nano-devices and systems. This book provides in-depth viewpoints on security issues and explains how nano devices and their unique properties can address the opportunities and challenges of the security community, manufacturers, system integrators, and end users. This book elevates security as a fundamental design parameter, transforming the way new nano-devices are developed. Part 1 focuses on nano devices and building security primitives. Part 2 focuses on emerging technologies and integrations.

Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017): Domenic Forte, Swarup... Hardware Protection through Obfuscation (Paperback, Softcover reprint of the original 1st ed. 2017)
Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor
R3,049 Discovery Miles 30 490 Ships in 10 - 15 working days

This book introduces readers to various threats faced during design and fabrication by today's integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or "IC Overproduction," insertion of malicious circuits, referred as "Hardware Trojans", which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
I Will Not Be Silenced
Karyn Maughan Paperback R350 R260 Discovery Miles 2 600
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Higher
Michael Buble CD  (1)
R459 Discovery Miles 4 590
Playseat Evolution Racing Chair (Black)
 (3)
R8,999 R6,999 Discovery Miles 69 990
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010
Dala Craft Pom Poms - Assorted Colours…
R34 Discovery Miles 340
Bestway Fantasy Unicorn Swim Ring (119cm…
R189 Discovery Miles 1 890
Cable Guys Controller and Smartphone…
R499 R409 Discovery Miles 4 090
Ambulance
Jake Gyllenhaal, Yahya Abdul-Mateen II, … DVD  (1)
R93 Discovery Miles 930
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100

 

Partners