Introduction to Hardware Security and Trust
The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-orient
- PDF / 11,424,580 Bytes
- 429 Pages / 439.37 x 666.142 pts Page_size
- 71 Downloads / 327 Views
Mohammad Tehranipoor • Cliff Wang Editors
Introduction to Hardware Security and Trust
123
Editors Mohammad Tehranipoor ECE Department University of Connecticut 371 Fairfield Way, Unit 2157 Storrs, CT 06269 USA [email protected]
Cliff Wang Computing and Information Science Division US Army Research Office PO Box 12211 Research Triangle Park NC 27709-2211 USA [email protected]
ISBN 978-1-4419-8079-3 e-ISBN 978-1-4419-8080-9 DOI 10.1007/978-1-4419-8080-9 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2011935539 © Springer Science+Business Media, LLC 2012 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
Contents
1
Background on VLSI Testing . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Junxia Ma and Mohammad Tehranipoor
1
2
Hardware Implementation of Hash Functions . . . . . .. . . . . . . . . . . . . . . . . . . . Zhijie Shi, Chujiao Ma, Jordan Cote, and Bing Wang
27
3
RSA: Implementation and Security . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . Nicholas Tuzzio and Mohammad Tehranipoor
51
4
Security Based on Physical Unclonability and Disorder . . . . . . . . . . . . . . . Ulrich R¨uhrmair, Srinivas Devadas, and Farinaz Koushanfar
65
5
Hardware Metering: A Survey .. . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 103 Farinaz Koushanfar
6
Secure Hardware IPs by Digital Watermark .. . . . . . .. . . . . . . . . . . . . . . . . . . . 123 Gang Qu and Lin Yuan
7
Physical Attacks and Tamper Resistance . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 143 Sergei Skorobogatov
8
Side Channel Attacks and Countermeasures .. . . . . . .. . . . . . . . . . . . . . . . . . . . 175 Ken Mai
9
Trusted Design in FPGAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 195 Mehrdad Majzoobi, Farinaz Koushanfar, and Miodrag Potkonjak
10 Security in Embedded Systems . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . 231 Yunsi Fei and Juan Carlos Martinez Santos 11 Side-Channel Attacks and Countermeasures for Embedded Microcontrollers . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . .
Data Loading...