menu
{ "item_title" : "Hardware Supply Chain Security", "item_author" : [" Basel Halak "], "item_description" : "This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/03/062/709/3030627098_b.jpg", "price_data" : { "retail_price" : "129.99", "online_price" : "129.99", "our_price" : "129.99", "club_price" : "129.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Hardware Supply Chain Security|Basel Halak

Hardware Supply Chain Security : Threat Modelling, Emerging Attacks and Countermeasures

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

This item is Non-Returnable

Details

  • ISBN-13: 9783030627096
  • ISBN-10: 3030627098
  • Publisher: Springer
  • Publish Date: February 2022
  • Dimensions: 9.21 x 6.14 x 0.5 inches
  • Shipping Weight: 0.74 pounds
  • Page Count: 217

Related Categories

You May Also Like...

    1

BAM Customer Reviews