High-Level Synthesis Hardware Trojan Attacks and Countermeasures (Materials, Circuits and Devices)

  • 予約
  • ポイントキャンペーン

High-Level Synthesis Hardware Trojan Attacks and Countermeasures (Materials, Circuits and Devices)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Hardcover:ハードカバー版/ページ数 250 p.
  • 言語 ENG
  • 商品コード 9781807050672

Full Description

Hardware trojans - which involve malicious modification of integrated circuits (ICs) during the design or fabrication stage - can give access to sensitive information, deny service, and so on. They can be difficult to detect but have serious consequences for the security of the IC.

Exploring hardware trojan attacks and their countermeasures using high level synthesis (HLS), this book covers different attack strategies, their detection and countermeasures, as well as future risks.

The expert author presents key information on hardware trojan attacks and their countermeasures. The book is split into four parts, starting with an introduction to hardware trojans and high-level synthesis, and then looking at various attack strategies. This is then followed by information on detection (a key issue in hardware trojan security), and countermeasures. The book finishes by looking at additional concerns and future directions of this key area in hardware security.

Readers will learn about topics such as hardware trojan classification and taxonomy, trojan attacks using malicious HLS framework, time bomb HLS-based hardware trojan attacks, trojan attacks on ML accelerator designs, other payloads of HLS trojan attack, trojan detection technique using DMR, and trojan detection and isolation technique and compromising IP designs via malicious exploitation of commercial CAD-HLS tools.

High-Level Synthesis Hardware Trojan Attacks and Countermeasures is a key resource for researchers and engineers working in hardware security and chip design.

Contents

Part I: Foundations

Chapter 1: Introduction to Hardware Trojans and High-Level Synthesis


Part II: Attack Strategies

Chapter 2: Trojan Attacks via Malicious HLS Framework
Chapter 3: Time Bomb HLS-based Hardware Trojan Attack for Performance Degradation
Chapter 4: Hardware Trojan Attacks on HLS based Machine Learning Accelerators
Chapter 5: Power Exhaustion Attacks in HLS


Part III: Detection and Countermeasures

Chapter 6: Machine Learning-based Detection of HLS Trojans
Chapter 7: HLS Trojan Detection using Dual Modular Redundancy (DMR) Techniques
Chapter 8: Trojan-Resistant IP Designs and Isolation Strategies


Part IV: Additional Perspectives

Chapter 9: Compromising IP Designs via Malicious Exploitation of Commercial CAD-HLS Tools Vs. Backdoor Trojan-inserted HLS Frameworks
Chapter 10: Conclusion and Future Direction

最近チェックした商品