Buch, Englisch, 139 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 242 g
ISBN: 978-3-030-41249-4
Verlag: Springer International Publishing
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
- Mathematik | Informatik EDV | Informatik Informatik Rechnerarchitektur
- Technische Wissenschaften Elektronik | Nachrichtentechnik Elektronik Bauelemente, Schaltkreise
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
Weitere Infos & Material
Introduction.- Practical Split Manufacturing Optimization.- IC Camouflaging Optimization and Evaluation.- Fault Attack Protection and Evaluation.- Conclusion.