Vtome.ru - электронная библиотека

Hardware Security Training, Hands-on!

  • Добавил: literator
  • Дата: 1-07-2023, 06:49
  • Комментариев: 0
Hardware Security Training, Hands-on!Название: Hardware Security Training, Hands-on!
Автор: Mark Tehranipoor, N. Nalla Anandakumar, Farimah Farahmandi
Издательство: Springer
Год: 2023
Страниц: 331
Язык: английский
Формат: pdf (true)
Размер: 17.1 MB

This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards, making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more.

All information technology systems are built using the physical hardware of the semiconductor chips found in all modern electronics, computers, communications networks, and critical cyber-physical systems. These chips are becoming cheaper, faster, and more powerful, and this has enabled the rise of the Internet of Things (IoT), autonomous systems, and artificial intelligence as key technologies of the future. As the world becomes increasingly reliant on advanced technologies for economic growth and national security, implicit trust in hardware becomes an untenable option. Moreover, trusted computing in hardware is fundamental to information security practices. The basis of security guarantees in digital systems is essentially a set of cryptographic operations executing in a hardware root of trust. Advanced cyber-attacks therefore deliberately target hardware devices in cryptosystems applications. The semiconductor chips have been targeted for reverse engineering, counterfeiting, piracy, malicious insertion, side-channel attacks, fault injection attacks, and probing attacks. These attacks, their associated vulnerabilities, root causes, and their countermeasures form the field of hardware security.

Hardware security has become an important topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with computer science, electronics, cryptography, physics, material sciences, communication systems, and signal processing. It sometimes requires the construction of specialized equipment, and it usually takes some practice to acquire laboratory skills—especially where attacks involve laboratory equipment. Therefore, it is necessary to acquire laboratory skills to help both academia and industry investigate hardware attacks, countermeasures, and solutions to address hardware security problems. To address this important growing need, we embarked on this initiative for developing the first-ever textbook dedicated to hands-on hardware security training that includes different attacks deliberately targeting hardware devices and applying countermeasure techniques against them. In this book, a wide variety of topics will be covered in 16 chapters. Chapter 1 presents physical unclonable functions (PUFs), Chap. 2 provides a true random number generator (TRNG), Chap. 3 presents recycled chip detection using ring oscillator-based odometer, Chap. 4 provides a recycled FPGA detection, Chap. 5 presents techniques of hardware Trojan insertion, Chap. 6 provides hardware Trojan detection, Chap. 7 presents security verification, Chap. 8 presents power analysis attack on AES, Chap. 9 presents EM-based side-channel attack on AES, Chap. 10 presents logic locking insertion and assessment, Chap. 11 presents clock glitch fault-injection attack on AES/FSM, Chap. 12 provides voltage glitch fault-injection attack on AES/FSM, Chap. 13 presents laser fault-injection attack, Chap. 14 presents optical probing attack on logic locking, Chap. 15 presents a universal fault sensor, and Chap. 16 presents scanning electron microscope (SEM) training. This book aims to provide holistic hands-on hardware security training to upper-level undergraduate engineering students and graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers.

Contents:


Скачать Hardware Security Training, Hands-on!



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.