• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses

ISBN-13: 9783030734473 / Angielski / Miękka / 2022

Ranga Vemuri;Suyuan Chen
Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses Vemuri, Ranga 9783030734473 Springer International Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses

ISBN-13: 9783030734473 / Angielski / Miękka / 2022

Ranga Vemuri;Suyuan Chen
cena 342,95 zł
(netto: 326,62 VAT:  5%)

Najniższa cena z 30 dni: 327,68 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits. Split manufacturing refers to the process of splitting an IC design into multiple parts and fabricating these parts at two or more foundries such that the design is secure even when some or all of those foundries are potentially untrusted. Realizing its security benefits, researchers have proposed split fabrication methods for 2D, 2.5D, and the emerging 3D ICs. Both attack methods against split designs and defense techniques to thwart those attacks while minimizing overheads have steadily progressed over the past decade.This book presents a comprehensive review of the state-of-the-art and emerging directions in design splitting for secure split fabrication, design recognition and recovery attacks against split designs, and design techniques to defend against those attacks. Readers will learn methodologies for secure and trusted IC design and fabrication using split design methods to protect against supply chain vulnerabilities.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Electronics - Circuits - General
Technology & Engineering > Electrical
Computers > Embedded Computer Systems
Wydawca:
Springer International Publishing
Język:
Angielski
ISBN-13:
9783030734473
Rok wydania:
2022
Waga:
0.35 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Introduction.- Split Manufacturing Methods.- Design Constraint Based Attacks.- Defenses Against Design Constraint Based Attacks.- Satisfiability Based Attacks.- Defenses Against Satisfiability Based Attacks.- Emerging Directions. 

Ranga Vemuri has been on the faculty of the Electrical  Engineering and Computer Science Department at the University of Cincinnati since 1989 and is currently a Professor. He directs the Digital Design Environments Lab. His interests span various topics within Hardware Trust, Correctness and Security; VLSI Design and Architectures; Formal Methods and Formal Verification; Electronic Design Automation; Reconfigurable Computing and FPGAs. He and his students have published over 300 papers and have received several Best Paper Awards and nominations. Prof. Vemuri graduated 42 PhD and  90 MS students. His research has been funded by AFRL, DAGSI, DARPA, NSF, State of Ohio and various industries including EDAptive Computing Inc.  Prof. Vemuri was an Associate Editor of the IEEE Transactions on VLSI and a Guest Editor of the IEEE Computer.

 

Suyuan Chen received a Ph.D. degree in Electrical Engineering from the University of Cincinnati in 2019. Currently, he is an ASIC Engineer at Apple Inc. where his work deals with SoC design using state-of-the-art 7nm, 5nm and 3nm CMOS technologies. His interests span a variety of topics in Hardware Security, LSI/AMS IC Design Methodologies, and Computer Aided Design. 

Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits.

Split manufacturing refers to the process of splitting an IC design into multiple parts and fabricating these parts at two or more foundries such that the design is secure even when some or all of those foundries are potentially untrusted. Realizing its security benefits, researchers have proposed split fabrication methods for 2D, 2.5D, and the emerging 3D ICs. Both attack methods against split designs and defense techniques to thwart those attacks while minimizing overheads have steadily progressed over the past decade.

This book presents a comprehensive review of the state-of-the-art and emerging directions in design splitting for secure split fabrication, design recognition and recovery attacks against split designs, and design techniques to defend against those attacks. Readers will learn methodologies for secure and trusted IC design and fabrication using split design methods to protect against supply chain vulnerabilities.

  • Provides the first book on Split Manufacturing methods, attacks and defenses for integrated circuits;
  • Serves as single-source reference to all advances to-date on split manufacturing methods and design splitting techniques for 2D, 2.5D and 3D integrated circuits, design recovery attacks and defense methods; 
  • Covers design constraint based attacks and satisfiability based attacks to reverse engineer split designs or to insert hardware trojans;
  • Covers design-for-trust defense techniques to thwart both reverse engineering and trojan insertion attacks;
  • Discusses the security benefits and cost penalties of various split design methods; 
  • Includes challenges and emerging research directions.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia