Hardware Security: A Hands On Learning Approach, Second Edition provides a broad, comprehensive, and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. The book covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies, and well designed, hands on laboratory exercises for each key concept. The book is ideal as a textbook for upper level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals.
For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
Table of Contents
1. Introduction to Hardware SecurityPart I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions