This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs.
Dr. Kasem Khalil is an assistant professor in the Department of Electrical and Computer Engineering, University of Mississippi.Haytham Idriss is an Assistant Professor in the Department of Computer Science, at the Purdue University Fort Wayne.Tarek Idriss is an Associate Professor in the Department of Computer Science, at Western Washington University.Dr. Magdy A. Bayoumi is Director of The Center for Advanced Computer Studies (CACS), and Department Head of the Computer Science Department at the University of Louisiana at Lafayette (UL Lafayette). He is also the Z.L. Loflin Eminent Scholar Endowed Chair Professor in Computer Science.
Innehållsförteckning
Chapter 1 Introduction and Background.- Chapter 2 Exploring Classic Security Attacks and Hardware Intricacies.- Chapter 3 Hardware Security Challenges.- Chapter 4 Security in Resource-Constrained IoT Devices.- Chapter 5 Physically Unclonable Functions.- Chapter 6 PUF: Security Threats.- Chapter 7 PUF Performance Testing and Evaluation.- Chapter 8 Improving the PUF’s Reliability.- Chapter 9 The Right Fit to your Device and Application.- Chapter 10 Advanced PUF designs.- Chapter 11 Lightweight PUF Protocols.