Foundations of Hardware IP Protection

Foundations of Hardware IP ProtectionL. Bossuet & L. Torres

Springer International Publishing AG.
This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection.

Table of Contents

Preface
Lilian Bossuet, Lionel Torres

 Chapter 1 - Digital right management for IP protection
Lionel Torres, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol, Lilian Bossuet

Chapter 2 – Turning electronic circuits features into on-chip locks
Brice Colombier, Lilian Bossuet, David Hély

Chapter 3 – Logic modification-based IP protection methods: an overview and a proposal
Brice Colombier, Lilian Bossuet, David Hély

Chapter 4 – IP FSM watermarking
Edward Jung, Lilian Bossuet

Chapter 5 – Side channel analysis, an efficient ally for IP protection
Lilian Bossuet, Cédric Marchand

 Chapter 6 – Hardware obfuscation
Georg T. Becker, Marc Fyrbiak, Christian Kison

 Chapter 7 – An application of partial hardware reverse engineering for the detection of hardware trojan
Franck Courbon

Chapter 8 – Linear complementary codes: novel hardware Trojan prevention and detection approach
Xuan Thuy NgoSylvain Guilley, Jean-Luc Danger

Chapter 9 – Ultra-lightweight implementation in area of block ciphers
Cédric Marchand, Lilian Bossuet, Kris Gaj

 Chapter 10 – Enhancing secure elements – Technology and architecture
Bertrand Cambou