New
Hardware Security,
Edition 2
A Hands-on Learning Approach
Editors:
By Swarup Bhunia, Ph.D., Purdue University and Mark M. Tehranipoor, Ph.D.
Publication Date:
01 Sep 2025
Hardware Security: A Hands On Learning Approach, Second Edition provides a broad, comprehensive, and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. The book covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies, and well designed, hands on laboratory exercises for each key concept. The book is ideal as a textbook for upper level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals.
For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
Key Features
- Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks
- Includes discussion of the liability, safety, and privacy implications of hardware and software security and interaction
- Gives insights on a wide range of security, trust issues, emerging attacks, protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution straight through to supply chain and deployment
- Presents a full range of instructor and student support materials that can be found on the authors’ own website: http://hwsecuritybook.org
1. Introduction to Hardware Security
Part I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB – Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions
Part I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB – Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions
ISBN:
9780443187544
Page Count: 526
Retail Price (USD)
:
9780134794105; 9780135764213; 9780357424377
Upper level engineering undergraduate students with majors in computer engineering, computer science, electrical engineering, and biomedical engineering / Navstem estimates the current overall US course market in computer security at 71,200 students per year, an increase of 69% since the first edition was proposed in 2016 Reference content for graduate students, researchers and industry professionals
Related Titles