Description

Book Synopsis


Table of Contents
1. Introduction to Hardware Security Part I: Background on Electronic Hardware2. A Quick Overview of Electronic Hardware3. System-on-Chip (SoC) Design and Test4. Printed Circuit Board (PCB) Design and Test Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS5. Hardware Trojans6. Electronics Supply Chain7. Hardware IP Piracy and Reverse Engineering8. Side-Channel Attacks9. Test-Oriented Attacks10. Physical Attacks and Countermeasures11. Attacks on PCB: Security Challenges and Vulnerabilities Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS12. Hardware Security Primitives13. Security and Trust Assessment, and Design for Security14. Hardware Obfuscation15. PCB Authentication and Integrity Validation Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS16. System Level Attacks and Countermeasures Appendix A: The Hardware Hacking (HaHa) Platform for Hands-on Training

Hardware Security

Product form

£71.24

Includes FREE delivery

RRP £74.99 – you save £3.75 (5%)

Order before 4pm today for delivery by Wed 7 Jan 2026.

A Paperback by Ph.D. Tehranipoor Mark M., Mark M. Tehranipoor

1 in stock


    View other formats and editions of Hardware Security by Ph.D. Tehranipoor Mark M.

    Publisher: Elsevier Science
    Publication Date: 11/2/2018 12:00:00 AM
    ISBN13: 9780128124772, 978-0128124772
    ISBN10: 0128124776

    Description

    Book Synopsis


    Table of Contents
    1. Introduction to Hardware Security Part I: Background on Electronic Hardware2. A Quick Overview of Electronic Hardware3. System-on-Chip (SoC) Design and Test4. Printed Circuit Board (PCB) Design and Test Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS5. Hardware Trojans6. Electronics Supply Chain7. Hardware IP Piracy and Reverse Engineering8. Side-Channel Attacks9. Test-Oriented Attacks10. Physical Attacks and Countermeasures11. Attacks on PCB: Security Challenges and Vulnerabilities Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS12. Hardware Security Primitives13. Security and Trust Assessment, and Design for Security14. Hardware Obfuscation15. PCB Authentication and Integrity Validation Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS16. System Level Attacks and Countermeasures Appendix A: The Hardware Hacking (HaHa) Platform for Hands-on Training

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account