New
Hardware Security,
Edition 2 A Hands-on Learning ApproachEditors: By Swarup Bhunia, Ph.D., Purdue University and Mark Tehranipoor, Ph.D.
Publication Date:
04 Jun 2026
Conformance
-
PDF/UA-1
-
The publication contains a conformance statement that it meets the EPUB Accessibility 1.1, WCAG 2.1, Level AA standard. Please see https://bornaccessible.benetech.org/certified-publishers/ for further details of our compatibility testing.
-
The publication was certified on 20250728
-
Accessibility addendum
-
The certifier's credential is https://bornaccessible.benetech.org/certified-publishers/
-
For detailed accessibility information, see Elsevier’s website at https://www-elsevier-com.ucc.idm.oclc.org/about/accessibility
-
Compatibility tested
-
For queries regarding accessibility information, contact [email protected]
Ways Of Reading
-
This e-publication is accessible to the full extent that the file format and types of content allow, on a specific reading device, by default, without necessarily including any additions such as textual descriptions of images or enhanced navigation.
-
All contents of the digital publication necessary to use and understanding, including any text, images (via alternative descriptions), video (via audio description) is fully accessible via suitable audio reproduction.
Navigation
-
The contents of the PDF have been tagged to permit access by assistive technologies as per PDF-UA-1 standard.
-
Page breaks included from the original print source
Additional Accessibility Information
-
All (or substantially all) textual matter is arranged in a single logical reading order (including text that is visually presented as separate from the main text flow, e.g., in boxouts, captions, tables, footnotes, endnotes, citations, etc.). Non-textual content is also linked from within this logical reading order. (Purely decorative non-text content can be ignored).
-
The language of the text has been specified (e.g., via the HTML or XML lang attribute) to optimise text-to-speech (and other alternative renderings), both at the whole document level and, where appropriate, for individual words, phrases or passages in a different language.
-
For readers with color vision deficiency, use of color (e.g., in diagrams, graphics and charts, in prompts, or on buttons inviting a response) is not the sole means of graphical distinction or of conveying information
-
Content is enhanced with ARIA roles to optimize organization and facilitate navigation
-
Where interactive content is included in the product, controls are provided (e.g., for speed, pause and resume, reset) and labelled to make their use clear.
-
WCAG v2.2
Note
-
This product relies on 3rd party tooling which may impact the accessibility features visible in inspection copies. All accessibility features mentioned would be present in the purchased version of the title.
Hardware Security: A Hands On Learning Approach, Second Edition provides a broad, comprehensive, and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. The book covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies, and well designed, hands on laboratory exercises for each key concept. The book is ideal as a textbook for upper level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals.
For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
Key Features
- Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks
- Includes discussion of the liability, safety, and privacy implications of hardware and software security and interaction
- Gives insights on a wide range of security, trust issues, emerging attacks, protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution straight through to supply chain and deployment
- Presents a full range of instructor and student support materials that can be found on the authors’ own website: http://hwsecuritybook.org
About the author
By Swarup Bhunia, Ph.D., Purdue University, Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA and Mark Tehranipoor, Ph.D., Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA
1. Introduction to Hardware Security
Part I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB – Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions
Part I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB – Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions
ISBN:
9780443187544
Page Count:
526
Retail Price
:
9780134794105; 9780135764213; 9780357424377
Upper level engineering undergraduate students with majors in computer engineering, computer science, electrical engineering, and biomedical engineering / Navstem estimates the current overall US course market in computer security at 71,200 students per year, an increase of 69% since the first edition was proposed in 2016 Reference content for graduate students, researchers and industry professionals