Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses » MIRLIB.RU - ТВОЯ БИБЛИОТЕКА
Корабли Российского императорского флота (1892-1917) Корабли Российского императорского флота (1892-1917) Андрагогика: основы теории, истории и технологии обучения взрослых Андрагогика: основы теории, истории и технологии обучения взрослых Финансовое моделирование с использованием Excel Финансовое моделирование с использованием Excel Modeling and Simulation of Intelligent Transportation Systems Modeling and Simulation of Intelligent Transportation Systems Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Проблемы новой и новейшей истории Проблемы новой и новейшей истории British Nannies and the Great War British Nannies and the Great War Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Outlier Detection in Python (Final Release) Outlier Detection in Python (Final Release) Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills
Корабли Российского императорского флота (1892-1917) Корабли Российского императорского флота (1892-1917) Андрагогика: основы теории, истории и технологии обучения взрослых Андрагогика: основы теории, истории и технологии обучения взрослых Финансовое моделирование с использованием Excel Финансовое моделирование с использованием Excel Modeling and Simulation of Intelligent Transportation Systems Modeling and Simulation of Intelligent Transportation Systems Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Complete Starter Guide to Making Bread: From Buns to Baguettes, Essential Recipes for All Bakers Проблемы новой и новейшей истории Проблемы новой и новейшей истории British Nannies and the Great War British Nannies and the Great War Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Redcoats to Tommies: The Experience of the British Soldier from the Eighteenth Century Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Some of My Best Friends are Cookies: Over 80 recipes for the best cookies of your life Outlier Detection in Python (Final Release) Outlier Detection in Python (Final Release) Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Мифы о драконах. От змея-искусителя и лернейской гидры до скандинавского Фафнира и морского Левиафана Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Microsoft Copilot for Power Apps: Transforming App Development with AI Assistance Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses
/
Название: Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses
Автор: Ranga Vemuri, Suyuan Chen
Издательство: Springer
Год: 2021
Формат: true pdf/epub
Страниц: 211
Размер: 13.5 Mb
Язык: English

Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits.
Split manufacturing refers to the process of splitting an IC design into multiple parts and fabricating these parts at two or more foundries such that the design is secure even when some or all of those foundries are potentially untrusted. Realizing its security benefits, researchers have proposed split fabrication methods for 2D, 2.5D, and the emerging 3D ICs. Both attack methods against split designs and defense techniques to thwart those attacks while minimizing overheads have steadily progressed over the past decade.
This book presents a comprehensive review of the state-of-the-art and emerging directions in design splitting for secure split fabrication, design recognition and recovery attacks against split designs, and design techniques to defend against those attacks. Readers will learn methodologies for secure and trusted IC design and fabrication using split design methods to protect against supply chain vulnerabilities.





ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!





[related-news]
[/related-news]
Комментарии 0
Комментариев пока нет. Стань первым!