Hardware Security

Book description

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries.

Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.

  • Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks
  • Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction
  • Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field
  • A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Preface
  7. Acknowledgments
  8. Chapter 1: Introduction to Hardware Security
    1. Abstract
    2. 1.1. Overview of a Computing System
    3. 1.2. Layers of a Computing System
    4. 1.3. What Is Hardware Security?
    5. 1.4. Hardware Security vs. Hardware Trust
    6. 1.5. Attacks, Vulnerabilities, and Countermeasures
    7. 1.6. Conflict Between Security and Test/Debug
    8. 1.7. Evolution of Hardware Security: A Brief Historical Perspective
    9. 1.8. Bird's Eye View
    10. 1.9. Hands-on Approach
    11. 1.10. Exercises
    12. References
  9. Part 1: Background on Electronic Hardware
    1. Chapter 2: A Quick Overview of Electronic Hardware
      1. Abstract
      2. 2.1. Introduction
      3. 2.2. Nanoscale Technologies
      4. 2.3. Digital Logic
      5. 2.4. Circuit Theory
      6. 2.5. ASICs and FPGAs
      7. 2.6. Printed Circuit Board
      8. 2.7. Embedded Systems
      9. 2.8. Hardware-Firmware-Software Interaction
      10. 2.9. Exercises
      11. References
    2. Chapter 3: System on Chip (SoC) Design and Test
      1. Abstract
      2. 3.1. Introduction
      3. 3.2. The IP-Based SoC Life-Cycle
      4. 3.3. SoC Design Flow
      5. 3.4. SoC Verification Flow
      6. 3.5. SoC Test Flow
      7. 3.6. Design-for-Debug
      8. 3.7. Structured DFT Techniques Overview
      9. 3.8. At-Speed Delay Test
      10. 3.9. Exercises
      11. References
    3. Chapter 4: Printed Circuit Board (PCB): Design and Test
      1. Abstract
      2. 4.1. Introduction
      3. 4.2. Evolution of PCB and Components
      4. 4.3. PCB Life Cycle
      5. 4.4. PCB Assembly Process
      6. 4.5. PCB Design Verification
      7. 4.6. Hands-on Experiment: Reverse Engineering Attacks
      8. 4.7. Exercises
      9. References
  10. Part 2: Hardware Attacks: Analysis, Examples, and Threat Models
    1. Chapter 5: Hardware Trojans
      1. Abstract
      2. 5.1. Introduction
      3. 5.2. SoC Design Flow
      4. 5.3. Hardware Trojans
      5. 5.4. Hardware Trojans in FPGA Designs
      6. 5.5. Hardware Trojans Taxonomy
      7. 5.6. Trust Benchmarks
      8. 5.7. Countermeasures Against Hardware Trojans
      9. 5.8. Hands-on Experiment: Hardware Trojan Attacks
      10. 5.9. Exercises
      11. References
    2. Chapter 6: Electronics Supply Chain
      1. Abstract
      2. 6.1. Introduction
      3. 6.2. Modern Electronic Supply Chain
      4. 6.3. Electronic Components Supply Chain Issues
      5. 6.4. Security Concerns
      6. 6.5. Trust Issues
      7. 6.6. Potential Countermeasures
      8. 6.7. Exercises
      9. References
    3. Chapter 7: Hardware IP Piracy and Reverse Engineering
      1. Abstract
      2. 7.1. Introduction
      3. 7.2. Hardware Intellectual Property (IP)
      4. 7.3. Security Issues in IP-Based SoC Design
      5. 7.4. Security Issues in FPGA
      6. 7.5. Hands-on Experiment: Reverse Engineering and Tampering
      7. 7.6. Exercises
      8. References
    4. Chapter 8: Side-Channel Attacks
      1. Abstract
      2. 8.1. Introduction
      3. 8.2. Background on Side-Channel Attacks
      4. 8.3. Power Analysis Attacks
      5. 8.4. Electromagnetic (EM) Side-Channel Attacks
      6. 8.5. Fault Injection Attacks
      7. 8.6. Timing Attacks
      8. 8.7. Covert Channels
      9. 8.8. Hands-on Experiment: Side-Channel Attack
      10. 8.9. Exercises
      11. References
    5. Chapter 9: Test-Oriented Attacks
      1. Abstract
      2. 9.1. Introduction
      3. 9.2. Scan-Based Attacks
      4. 9.3. JTAG-Based Attacks
      5. 9.4. Hands-on Experiment: JTAG Attack
      6. 9.5. Exercises
      7. References
    6. Chapter 10: Physical Attacks and Countermeasures
      1. Abstract
      2. 10.1. Introduction
      3. 10.2. Reverse Engineering
      4. 10.3. Probing Attack
      5. 10.4. Invasive Fault Injection Attack
      6. 10.5. Exercises
      7. References
    7. Chapter 11: Attacks on PCB: Security Challenges and Vulnerabilities
      1. Abstract
      2. 11.1. Introduction
      3. 11.2. PCB Security Challenges: Attacks on PCB
      4. 11.3. Attack Models
      5. 11.4. Hands-on Experiment: Bus Snooping Attack
      6. 11.5. Exercises
      7. References
  11. Part 3: Countermeasures Against Hardware Attacks
    1. Chapter 12: Hardware Security Primitives
      1. Abstract
      2. 12.1. Introduction
      3. 12.2. Preliminaries
      4. 12.3. Physical Unclonable Function
      5. 12.4. True Random Number Generator
      6. 12.5. Design for Anti-Counterfeit
      7. 12.6. Existing Challenges and Attacks
      8. 12.7. Primitive Designs With Emerging Nanodevices
      9. 12.8. Hands-on Experiment: Hardware Security Primitives (PUFs and TRNGs)
      10. 12.9. Exercises
      11. References
    2. Chapter 13: Security and Trust Assessment, and Design for Security
      1. Abstract
      2. 13.1. Introduction
      3. 13.2. Security Assets and Attack Models
      4. 13.3. Pre-silicon Security and Trust Assessment for SoCs
      5. 13.4. Post-silicon Security and Trust Assessment for ICs
      6. 13.5. Design for Security
      7. 13.6. Exercises
      8. References
    3. Chapter 14: Hardware Obfuscation
      1. Abstract
      2. 14.1. Introduction
      3. 14.2. Overview of Obfuscation Techniques
      4. 14.3. Hardware Obfuscation Methods
      5. 14.4. Emerging Obfuscation Approaches
      6. 14.5. Use of Obfuscation Against Trojan Attacks
      7. 14.6. Hands-on Experiment: Hardware IP Obfuscation
      8. 14.7. Exercises
      9. References
    4. Chapter 15: PCB Authentication and Integrity Validation
      1. Abstract
      2. 15.1. PCB Authentication
      3. 15.2. Sources of PCB Signature
      4. 15.3. Signature Procurement and Authentication Methods
      5. 15.4. Signature Assessment Metric
      6. 15.5. Emerging Solutions
      7. 15.6. PCB Integrity Validation
      8. 15.7. Hands-on Experiment: PCB Tampering Attacks (Modchip)
      9. 15.8. Exercises
      10. References
  12. Part 4: Emerging Trends in Hardware Attacks and Protections
    1. Chapter 16: System Level Attacks & Countermeasures
      1. Abstract
      2. 16.1. Introduction
      3. 16.2. Background on SoC Design
      4. 16.3. SoC Security Requirements
      5. 16.4. Security Policy Enforcement
      6. 16.5. Secure SoC Design Process
      7. 16.6. Threat Modeling
      8. 16.7. Hands-on Experiment: SoC Security Policy
      9. 16.8. Exercises
      10. References
  13. Appendix A: The Hardware Hacking (HaHa) Platform for Hands-on Training
    1. A.1. HaHa Board
    2. A.2. Operation Instructions
    3. A.3. Examples for Programming the FPGA and the Microcontroller
    4. A.4. Design Specifications
  14. Index

Product information

  • Title: Hardware Security
  • Author(s): Swarup Bhunia, Mark M. Tehranipoor
  • Release date: October 2018
  • Publisher(s): Morgan Kaufmann
  • ISBN: 9780128124789