Description |
1 online resource |
Series |
Analog circuits and signal processing |
|
Analog circuits and signal processing series.
|
Contents |
The Need for Logic Locking -- A Brief History of Logic Locking -- Pre-SAT Logic Locking -- The SAT Attack -- Post-SAT 1: Point function-based Logic Locking -- Approximate Attacks -- Structural Attacks -- Post-SAT 2: Insertion of SAT-unresolvable Structures -- Post-SAT 3: Stripped-Functionality Logic Locking |
Summary |
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research. Different from the edited monograms, the chapters in this book are not re-compilations of research papers. The book follows a pedagogical approach. Each chapter has been planned to emphasize the fundamental principles behind the logic locking algorithms and relate concepts to each other using a systematization of knowledge approach. Furthermore, the authors of this book are in a good position to be able to deliver such a book, as they contributed to this field significantly through numerous fundamental papers |
Bibliography |
Includes bibliographical references |
Notes |
Online resource; title from PDF title page (EBSCO, viewed September 13, 2019) |
Subject |
Logic circuits.
|
|
Logic design.
|
|
Hardware Trojans (Computers)
|
|
Computer security.
|
|
Computer security
|
|
Hardware Trojans (Computers)
|
|
Logic circuits
|
|
Logic design
|
Form |
Electronic book
|
Author |
Rajenn, Jeyavijayan (JV), author
|
|
Sinanoglu, Ozgur, author
|
ISBN |
9783030153342 |
|
3030153347 |
|