Trustworthy Hardware Design: Combinational Logic Locking Techniques - Muhammad Yasin, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu

Trustworthy Hardware Design: Combinational Logic Locking Techniques

Buch | Hardcover
XXI, 142 Seiten
2019 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-15333-5 (ISBN)
128,39 inkl. MwSt
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research.

Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book have contributed to this field significantly through numerous fundamental papers.

 


Muhammad is a PhD candidate at Tandon School of Engineering and a Global PhD Student Fellow in NYUAD. He obtained his MS in Microsystems Engineering from Masdar Institute of Science and Technology, UAE, in 2013 and BS in Elec- trical Engineering from University of Engineering and Technology (UET) Lahore, Pakistan, in 2007. He has previously served as Lecturer at COMSATS Institute of IT, Lahore. His research interests include Hardware Security and Design for Trust. Jeyavijayan Rajendran is an Assistant Professor in the Department of Elec- trical and Computer Engineering at Texas A&M University. He obtained his Ph.D. degree in the Electrical and Computer Engineering Department at New York University in August 2015. His research interests include hardware secu- rity and emerging technologies. His research has won the NSF CAREER Award in 2017, the ACM SIGDA Outstanding Ph.D. Dissertation Award in 2017, and the Alexander Hessel Award for the Best Ph.D. Dissertation in the Electrical and Computer Engineering Department at NYU in 2016. He has won three Student Paper Awards (ACM CCS 2013, IEEE DFTS 2013, and IEEE VLSI Design 2012); four ACM Student Research Competition Awards (DAC 2012, ICCAD 2013, DAC 2014, and the Grand Finals 2013); Service Recognition Award from Intel; Third place at Kaspersky American Cup, 2011; and Myron M. Rosenthal Award for Best Academic Performance in M.S. from NYU, 2011. He organizes the annual Embed- ded Security Challenge, a red-team/blue-team hardware security competition and has co-founded Hack@DAC, a student security competition co-located with DAC. He is a member of IEEE and ACM.

The Need for Logic Locking.- A Brief History of Logic Locking.- Pre-SAT Logic Locking.- The SAT Attack.- Post-SAT 1: Point function-based Logic Locking.- Approximate Attacks.- Structural Attacks.- Post-SAT 2: Insertion of SAT-unresolvable Structures.- Post-SAT 3: Stripped-Functionality Logic Locking.

Erscheinungsdatum
Reihe/Serie Analog Circuits and Signal Processing
Zusatzinfo XXI, 142 p. 65 illus., 58 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 372 g
Themenwelt Informatik Theorie / Studium Algorithmen
Informatik Weitere Themen Hardware
Technik Elektrotechnik / Energietechnik
Schlagworte combinational logic locking • Hardware Design • hardware security • logic locking concepts • qualitative security evaluation • security techniques
ISBN-10 3-030-15333-9 / 3030153339
ISBN-13 978-3-030-15333-5 / 9783030153335
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media

von Jens Gallenbacher

Buch | Softcover (2021)
Springer (Verlag)
29,99
Interlingua zur Gewährleistung semantischer Interoperabilität in der …

von Josef Ingenerf; Cora Drenkhahn

Buch | Softcover (2023)
Springer Fachmedien (Verlag)
32,99