Counterfeit Integrated Circuits


Download Counterfeit Integrated Circuits PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Counterfeit Integrated Circuits book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Counterfeit Integrated Circuits


Counterfeit Integrated Circuits

Author: Mark (Mohammad) Tehranipoor

language: en

Publisher: Springer

Release Date: 2015-02-12


DOWNLOAD





This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat. · Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; · Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; · Provides step-by-step solutions for detecting different types of counterfeit ICs; · Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.

The Committee's Investigation Into Counterfeit Electronic Parts in the Department of Defense Supply Chain


The Committee's Investigation Into Counterfeit Electronic Parts in the Department of Defense Supply Chain

Author: United States. Congress. Senate. Committee on Armed Services

language: en

Publisher:

Release Date: 2012


DOWNLOAD





Hardware Supply Chain Security


Hardware Supply Chain Security

Author: Basel Halak

language: en

Publisher: Springer Nature

Release Date: 2021-02-04


DOWNLOAD





This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.