The Hardware Trojan War

The Hardware Trojan War
Author: Swarup Bhunia
Publisher: Springer
Total Pages: 383
Release: 2017-11-29
Genre: Technology & Engineering
ISBN: 3319685112

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

Introduction to Hardware Security and Trust

Introduction to Hardware Security and Trust
Author: Mohammad Tehranipoor
Publisher: Springer Science & Business Media
Total Pages: 429
Release: 2011-09-22
Genre: Technology & Engineering
ISBN: 1441980806

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

Viruses, Hardware and Software Trojans

Viruses, Hardware and Software Trojans
Author: Anatoly Belous
Publisher: Springer Nature
Total Pages: 839
Release: 2020-06-27
Genre: Technology & Engineering
ISBN: 3030472183

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Internet of Things

Internet of Things
Author: Bharat Bhusan
Publisher: CRC Press
Total Pages: 321
Release: 2022-04-28
Genre: Computers
ISBN: 1000578941

Today, Internet of Things (IoT) is ubiquitous as it is applied in practice in everything from Industrial Control Systems (ICS) to e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities, smart parking, healthcare, supply chain management and many more. Numerous industries, academics, alliances and standardization organizations make an effort on IoT standardization, innovation and development. But there is still a need for a comprehensive framework with integrated standards under one IoT vision. Furthermore, the existing IoT systems are vulnerable to huge range of malicious attacks owing to the massive numbers of deployed IoT systems, inadequate data security standards and the resource-constrained nature. Existing security solutions are insufficient and therefore it is necessary to enable the IoT devices to dynamically counter the threats and save the system. Apart from illustrating the diversified IoT applications, this book also addresses the issue of data safekeeping along with the development of new security-enhancing schemes such as blockchain, as well as a range of other advances in IoT. The reader will discover that the IoT facilitates a multidisciplinary approach dedicated to create novel applications and develop integrated solutions to build a sustainable society. The innovative and fresh advances that demonstrate IoT and computational intelligence in practice are discussed in this book, which will be helpful and informative for scientists, research scholars, academicians, policymakers, industry professionals, government organizations and others. This book is intended for a broad target audience, including scholars of various generations and disciplines, recognized scholars (lecturers and professors) and young researchers (postgraduate and undergraduates) who study the legal and socio-economic consequences of the emergence and dissemination of digital technologies such as IoT. Furthermore, the book is intended for researchers, developers and operators working in the field of IoT and eager to comprehend the vulnerability of the IoT paradigm. The book will serve as a comprehensive guide for the advanced-level students in computer science who are interested in understanding the severity and implications of the accompanied security issues in IoT. Dr. Bharat Bhushan is an Assistant Professor of Department of Computer Science and Engineering (CSE) at School of Engineering and Technology, Sharda University, Greater Noida, India. Prof. (Dr.) Sudhir Kumar Sharma is currently a Professor and Head of the Department of Computer Science, Institute of Information Technology & Management affiliated to GGSIPU, New Delhi, India. Prof. (Dr.) Bhuvan Unhelkar (BE, MDBA, MSc, PhD; FACS; PSM-I, CBAP®) is an accomplished IT professional and Professor of IT at the University of South Florida, Sarasota-Manatee (Lead Faculty). Dr. Muhammad Fazal Ijaz is working as an Assistant Professor in Department of Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. Prof. (Dr.) Lamia Karim is a professor of computer science at the National School of Applied Sciences Berrechid (ENSAB), Hassan 1st University.

Advances in Manufacturing Technology XXXII

Advances in Manufacturing Technology XXXII
Author: P. Thorvald
Publisher: IOS Press
Total Pages: 558
Release: 2018-08-29
Genre: Technology & Engineering
ISBN: 1614999023

The urgent need to keep pace with the accelerating globalization of manufacturing in the 21st century has produced rapid advancements in technology, research and innovation. This book presents the proceedings of the 16th International Conference on Manufacturing Research incorporating the 33nd National Conference on Manufacturing Research (ICMR 2018), held in Skövde, Sweden, in September 2018. The aim of the conference is to create a friendly and inclusive environment, bringing together researchers, academics and industrialists with practical and theoretical knowledge to share and discuss emerging trends and new challenges. The book is divided into 12 parts, covering areas such as the manufacturing process; robots; product design and development; smart manufacturing; and lean, among others. Covering both cutting-edge research and recent industrial applications, the book will appeal to all those with an interest in recent advances in manufacturing technology.

Behavioral Synthesis for Hardware Security

Behavioral Synthesis for Hardware Security
Author: Srinivas Katkoori
Publisher: Springer Nature
Total Pages: 397
Release: 2022-02-08
Genre: Technology & Engineering
ISBN: 3030788415

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.

Handbook of Power Electronics in Autonomous and Electric Vehicles

Handbook of Power Electronics in Autonomous and Electric Vehicles
Author: Muhammad H. Rashid
Publisher: Elsevier
Total Pages: 370
Release: 2024-07-22
Genre: Technology & Engineering
ISBN: 0323950981

Handbook of Power Electronics in Autonomous and Electric Vehicles provides advanced knowledge on autonomous systems, electric propulsion in electric vehicles, radars and sensors for autonomous systems, and relevant aspects of energy storage and battery charging. The work is designed to provide clear technical presentation with a focus on commercial viability. It supports any and all aspects of a project requiring specialist design, analysis, installation, commissioning and maintenance services. With this book in hand, engineers will be able to execute design, analysis and evaluation of assigned projects using sound engineering principles and commercial requirements, policies, and product and program requirements. - Presents core power systems and engineering applications relevant to autonomous and electric vehicles in characteristic depth and technical presentation - Offers practical support and guidance with detailed examples and applications for laboratory vehicular test plans and automotive field experimentation - Includes modern technical coverage of emergent fields, including sensors and radars, battery charging and monitoring, and vehicle cybersecurity

The Next Era in Hardware Security

The Next Era in Hardware Security
Author: Nikhil Rangarajan
Publisher: Springer Nature
Total Pages: 271
Release: 2021-10-23
Genre: Technology & Engineering
ISBN: 3030857921

This book provides a comprehensive coverage of hardware security concepts, derived from the unique characteristics of emerging logic and memory devices and related architectures. The primary focus is on mapping device-specific properties, such as multi-functionality, runtime polymorphism, intrinsic entropy, nonlinearity, ease of heterogeneous integration, and tamper-resilience to the corresponding security primitives that they help realize, such as static and dynamic camouflaging, true random number generation, physically unclonable functions, secure heterogeneous and large-scale systems, and tamper-proof memories. The authors discuss several device technologies offering the desired properties (including spintronics switches, memristors, silicon nanowire transistors and ferroelectric devices) for such security primitives and schemes, while also providing a detailed case study for each of the outlined security applications. Overall, the book gives a holistic perspective of how the promising properties found in emerging devices, which are not readily afforded by traditional CMOS devices and systems, can help advance the field of hardware security.

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms
Author: Krishnendu Guha
Publisher: Springer Nature
Total Pages: 195
Release: 2021-08-23
Genre: Computers
ISBN: 3030797015

This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime.

Split Manufacturing of Integrated Circuits for Hardware Security and Trust

Split Manufacturing of Integrated Circuits for Hardware Security and Trust
Author: Ranga Vemuri
Publisher: Springer Nature
Total Pages: 193
Release: 2021-05-25
Genre: Technology & Engineering
ISBN: 3030734455

Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits. Split manufacturing refers to the process of splitting an IC design into multiple parts and fabricating these parts at two or more foundries such that the design is secure even when some or all of those foundries are potentially untrusted. Realizing its security benefits, researchers have proposed split fabrication methods for 2D, 2.5D, and the emerging 3D ICs. Both attack methods against split designs and defense techniques to thwart those attacks while minimizing overheads have steadily progressed over the past decade. This book presents a comprehensive review of the state-of-the-art and emerging directions in design splitting for secure split fabrication, design recognition and recovery attacks against split designs, and design techniques to defend against those attacks. Readers will learn methodologies for secure and trusted IC design and fabrication using split design methods to protect against supply chain vulnerabilities.