• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • Advances in Hardware Design for Security and Trust

    Advances in Hardware Design for Security and Trust by Vemuri, Ranga; Emmert, John;

    Series: Computer Hardware Security and Correctness;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 130.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        65 793 Ft (62 660 Ft + 5% VAT)
      • Discount 20% (cc. 13 159 Ft off)
      • Discounted price 52 634 Ft (50 128 Ft + 5% VAT)

    65 793 Ft

    db

    Availability

    Not yet published.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 1
    • Publisher CRC Press
    • Date of Publication 26 August 2025

    • ISBN 9781032840420
    • Binding Hardback
    • No. of pages392 pages
    • Size 234x156 mm
    • Weight 453 g
    • Language English
    • Illustrations 118 Illustrations, black & white; 57 Illustrations, color; 33 Halftones, black & white; 12 Halftones, color; 85 Line drawings, black & white; 45 Line drawings, color; 10 Tables, black & white
    • 0

    Categories

    Short description:

    This book covers the entire spectrum of hardware design including integrated circuits, embedded systems, and design automation tools. It also captures recent advances in various attack and defense methods. 

    More

    Long description:

    This book addresses various electronics supply-chain vulnerabilities, attack methods which exploit these vulnerabilities, and design techniques to mitigate the vulnerabilities while defending against the attacks. This book covers the entire spectrum of electronic hardware design including integrated circuits, embedded systems, and design automation tools.


    Advances in Hardware Design for Security and Trust offers self-contained tutorials within each chapter, as well as a presentation of recent advances. The relevance of each method in the context of the overall design and fabrication process is clearly articulated. Both qualitative analysis and quantitative experimental results to evaluate the significance of methods are presented. Both side-channel methods as well as front-channel techniques are covered. The authors emphasize methods which are ready for technology transition and commercialization.


    This book is intended for both researchers and industry practitioners. They will benefit from the tutorial style exposition of the topics along with advanced research results and emerging directions.

    More

    Table of Contents:

    1. Introduction 2. Hardware Security In The Consumer Technology Industry 3. A Commercial EDA Perspective on Hardware Security, Safety, and Trust 4. Machine Learning Techniques for Detecting Hardware Trojans in ASIC designs 5. Next-Generation Semiconductor Reverse Engineering: Laser Delayering, Correlative Imaging, and Cloud-Enabled Image Analysis Techniques 6. Synthesis of Polymorphic Circuits for Hardware Security 7. Design Obfuscation and Performance Locking Solutions for Mixed-Signal, Analog and RF ICs 8. On-Chip Integrity, Reliability, and Aging Assurance Techniques for ICs 9. Deep Learning Side-Channel Attack: Challenges and Opportunities 10. Side Channel Attack Avoidance and Mitigation through Asynchronous Digital Design 11. Is ARM TrustZone trustable for confidentiality protection? 12. Security Verification for Next Generation SoCs 13. Cloud FPGA Accelerator Fingerprinting Using Communication Side-Channels 14. Enterprise Risk Management of Electronics and Computing Device Supply Chains

    More