000 | nam a22 4500 | ||
---|---|---|---|
999 |
_c33121 _d33121 |
||
008 | 240319b xxu||||| |||| 00| 0 eng d | ||
020 | _a9783031379888 | ||
082 |
_a005.8 _bZAM |
||
100 | _aZamiri Azar, Kimia | ||
245 | _aUnderstanding logic locking | ||
260 |
_bSpringer, _c2024 _aCham : |
||
300 |
_axvi, 381 p. ; _bill., _c24 cm |
||
365 |
_d93.50 _b99.99 _c€ |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _aThis book demonstrates the breadth and depth of IP protection through logic locking, considering both attacker/adversary and defender/designer perspectives. The authors draw a semi-chronological picture of the evolution of logic locking during the last decade, gathering and describing all the DO’s and DON’Ts in this approach. They describe simple-to-follow scenarios and guide readers to navigate/identify threat models and design/evaluation flow for further studies. Readers will gain a comprehensive understanding of all fundamentals of logic locking. Covers modern VLSI design, testability and debug, and hardware security threats at different levels of abstraction; Provides a comprehensive overview of logic locking techniques and their applications to hardware security; Covers logic locking from implementation to evaluation, different assumptions, models and abstraction layers. | ||
650 | _aComputer security | ||
650 | _aIT security | ||
700 | _aMardani Kamali, Hadi | ||
700 | _aFarahmandi, Farimah | ||
700 | _aTehranipoor, Mark | ||
942 |
_2ddc _cBK |