For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
Table of Contents
1. Introduction to Hardware SecurityPart I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions

