
Hardware Security
A Hands-on Learning Approach
- 2nd Edition - May 1, 2026
- Latest edition
- Authors: Swarup Bhunia, Mark M. Tehranipoor
- Language: English
- Paperback ISBN:9 7 8 - 0 - 4 4 3 - 1 8 7 5 4 - 4
- eBook ISBN:9 7 8 - 0 - 4 4 3 - 1 8 7 5 3 - 7
Hardware Security: A Hands On Learning Approach, Second Edition provides a broad, comprehensive, and practical overview of hardware security that encompasses all levels of the el… Read more

Hardware Security: A Hands On Learning Approach, Second Edition provides a broad, comprehensive, and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. The book covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies, and well designed, hands on laboratory exercises for each key concept. The book is ideal as a textbook for upper level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals.
For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
For academic courses, the book contains a robust suite of teaching ancillaries. Users of the book can access schematic, layout and design files for a printed circuit board for hardware hacking (i.e., the HaHa board), a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
- Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks
- Includes discussion of the liability, safety, and privacy implications of hardware and software security and interaction
- Gives insights on a wide range of security, trust issues, emerging attacks, protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution straight through to supply chain and deployment
- Presents a full range of instructor and student support materials that can be found on the authors’ own website: http://hwsecuritybook.org
Upper level engineering undergraduate students with majors in computer engineering, computer science, electrical engineering, and biomedical engineering / Navstem estimates the current overall US course market in computer security at 71,200 students per year, an increase of 69% since the first edition was proposed in 2016 Reference content for graduate students, researchers and industry professionals
1. Introduction to Hardware Security
Part I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB – Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions
Part I: Electronic Hardware (ASIC, FPGA, PCBs)
2. Background on Electronic Hardware
3. System on Chip (S0C) Design and Test
4. Printed Circuit Boards (PCBs) Design and Test
Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS
5. Hardware Trojan Horse
6. Hardware Supply Chain Issues
7. Hardware IP Piracy and IP Reverse Engineering
8. Side Channel Attacks (SCA)
9. Scan based Attacks, JTAG Hacks and DMA Attacks
10. IC Microprobing Attacks and IC Reverse Engineering
11. Attacks on PCB – Snooping, Counterfeiting, Reverse Engineering and Piracy, Physical Attacks
Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS
12. Hardware Security Primitives
13. Design for Security (DfS) and Security/Trust Validation for Integrated Circuits
14. Hardware Obfuscation
15. PCB Integrity Validation and Authentication
Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS
16. Joint Hardware Software Attacks and Countermeasures
17. Summary and Future Directions
- Edition: 2
- Latest edition
- Published: May 1, 2026
- Language: English
SB
Swarup Bhunia
Swarup Bhunia is a professor in the department of Electrical and Computer Engineering at the University of Florida. He has more than ten years of research and development experience with over 200 publications in peer-reviewed journals and premier conferences. His research interests include hardware security and trust, adaptive nanocomputing and novel test methodologies. Dr. Bhunia received the IBM Faculty Award (2013), National Science Foundation career development award (2011), Semiconductor Research Corporation Inventor Recognition Award (2009), and SRC technical excellence award (2005), and several best paper awards/nominations. He has been serving as an associate editor of IEEE Transactions on CAD, IEEE Transactions on Multi-Scale Computing Systems, ACM Journal of Emerging Technologies, and Journal of Low Power Electronics; served as guest editor of IEEE Design & Test of Computers (2010, 2013) and IEEE Journal on Emerging and Selected Topics in Circuits and Systems (2014). He is a senior member of IEEE.
Affiliations and expertise
Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USAMT
Mark M. Tehranipoor
Mark Tehranipoor is the Intel Charles E. Young Professor in Cybersecurity at the Department of Electrical and Computer Engineering (ECE), University of Florida. Prof. Tehranipoor has published over 300 journal articles and refereed conference papers and has given more than 150 invited talks and keynote addresses since 2006. In addition, he has published six books and ten book chapters. His projects are sponsored by both industry (Semiconductor Research Corporation (SRC), Texas Instruments, Freescale Comcast, Honeywell, LSI, Mentor Graphics, Juniper, R3Logic, Cisco, Qualcomm, MediaTeck, etc.) and the US Government (NSF, ARO, MDA, DOD, AFOSR, DOE, etc.). Prior to joining the University of Florida, Dr. Tehranipoor served as the founding director of the Center for Hardware Assurance, Security, and Engineering (CHASE) and the Comcast Center of Excellence in Security Innovation (CSI) at the University of Connecticut. Prof. Tehranipoor is a Senior Member of the IEEE, Golden Core Member of IEEE Computer Society, and Member of ACM and ACM SIGDA. He is also a member of Connecticut Academy of Science and Engineering (CASE).
Affiliations and expertise
Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA