Your browser does not support JavaScript!

Frontiers in Hardware Security and Trust; Theory, design and practice

Buy e-book PDF
(plus tax if applicable)
Buy print edition
image of Frontiers in Hardware Security and Trust; Theory, design and practice
Editors: Chip Hong Chang 1 ; Yuan Cao 2
View affiliations
Publication Year: 2020

Frontiers in Hardware Security and Trust provides a comprehensive review of emerging ecurity threats and privacy protection issues, and the versatile state-of-the-art hardwarebased security countermeasures and applications proposed by the hardware security community. The footprint and power constraints imposed on internet-of-things end-points, smart sensors, mobile and ad hoc network devices make traditional and software based cryptographic solutions that require a general-purpose processor increasingly unfeasible. The fact that security is not the primary functionality of these devices means that only a small portion of their limited processing power and storage is available for security, driving the need for alternative security solutions. Hardware security - including hardware obfuscation, hardware security primitives, side-channel attacks and so on - is therefore becoming an increasingly active research area in both academia and industry. This book discusses the fundamentals of reversible logics, hardware obfuscations, SAT resistant logic obfuscation, and design-for-security. Novel security primitives such as state-of-the-art true random number generators are also explored. Modern micro-architectural attacks enabled with the superscalar microprocessors and its countermeasures are analysed to shed light on how existing architectures can be fortified or made more robust against attack. The introduction of hardware security into cognitive radio networks, 5G networks and machine learning, which are widely considered to be the most promising major contributors to next wave of technological growth, are also discussed. The book serves as an advanced reference for researchers on current hardware security problems, challenges and solutions.

Inspec keywords: controller area networks; industrial property; trusted computing; MIMO communication; learning (artificial intelligence); cognitive radio; formal verification; 5G mobile communication; security; neural nets; integrated circuits; random number generation

Other keywords: silicon-based true random number generators; 5G networks; in-vehicle controller area network; formal verification; cryptographic primitive protection; information leakage; SoC security; robust codes; public-key cryptography; hardware security; homomorphic encryption; EMC techniques; energy-efficient cognitive communications; CACHEKIT attack mitigation; mm-wave massive MIMO communications; deep learning network security; microarchitectural attacks; IC piracy threats; hardware obfuscation; persistent fault analysis; confidential cognitive communications; block ciphers; nondigital components; IP protection; physical-layer security; IP piracy threats; reversible circuits; hardware trust; IC chip design

Subjects: General electrical engineering topics; Neural computing techniques; General and management topics; Data security; Local area networks; Digital arithmetic methods; Radio links and equipment; Semiconductor integrated circuits

Related content

This is a required field
Please enter a valid email address