Overview: Discusses attacks including side-channel, fault-injection, optical probing, PUF, TRNGs, hardware Trojans and more.Provides hands-on experiments, with step-by-step description, for attacks and countermThis is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry profes
|