Foundations of Hardware IP ProtectionL. Bossuet & L. Torres
Springer International Publishing AG.
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.
Table of Contents
Preface
Lilian Bossuet, Lionel Torres
Chapter 1 - Digital right management for IP protection
Lionel Torres, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol, Lilian Bossuet
Chapter 2 – Turning electronic circuits features into on-chip locks
Brice Colombier, Lilian Bossuet, David Hély
Chapter 3 – Logic modification-based IP protection methods: an overview and a proposal
Brice Colombier, Lilian Bossuet, David Hély
Chapter 4 – IP FSM watermarking
Edward Jung, Lilian Bossuet
Chapter 5 – Side channel analysis, an efficient ally for IP protection
Lilian Bossuet, Cédric Marchand
Chapter 6 – Hardware obfuscation
Georg T. Becker, Marc Fyrbiak, Christian Kison
Chapter 7 – An application of partial hardware reverse engineering for the detection of hardware trojan
Franck Courbon
Chapter 8 – Linear complementary codes: novel hardware Trojan prevention and detection approach
Xuan Thuy NgoSylvain Guilley, Jean-Luc Danger
Chapter 9 – Ultra-lightweight implementation in area of block ciphers
Cédric Marchand, Lilian Bossuet, Kris Gaj
Chapter 10 – Enhancing secure elements – Technology and architecture
Bertrand Cambou