logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection by Salmani, Hassan ISBN 9783319790800, 3319790803

  • SKU: EBN-55613220
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection after payment.
Authors:Salmani, Hassan
Pages:142 pages.
Year:2018
Editon:1st ed. 2018
Publisher:Springer
File Size:6.83 MB
Format:pdf
ISBNS:9783319790800, 3319790803
Categories: Ebooks

Product desciption

(Ebook) Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection by Salmani, Hassan ISBN 9783319790800, 3319790803

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products