Overview: Explains details of hardware Trojan attacks and associated trust issues, including threat models/instances, attack surfaces, adversaries, and all sorts of protection approaches.Covers Trojan threats a.This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scop
|