Artículos relacionados a Hardware Malware (Synthesis Lectures on Information...

Hardware Malware (Synthesis Lectures on Information Security, Privacy, and Trust) - Tapa blanda

 
9781627052511: Hardware Malware (Synthesis Lectures on Information Security, Privacy, and Trust)

Sinopsis

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.

Table of Contents: List of Figures / Introduction / Hardware Trojans / Countermeasures / Historical Overview / Hot Topics and Conclusions / Glossary / Bibliography / Authors' Biographies

"Sinopsis" puede pertenecer a otra edición de este libro.

Reseña del editor

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field. Table of Contents: List of Figures / Introduction / Hardware Trojans / Countermeasures / Historical Overview / Hot Topics and Conclusions / Glossary / Bibliography / Authors' Biographies

"Sobre este título" puede pertenecer a otra edición de este libro.

  • EditorialMorgan & Claypool Publishers
  • Año de publicación2013
  • ISBN 10 1627052518
  • ISBN 13 9781627052511
  • EncuadernaciónTapa blanda
  • IdiomaInglés
  • Número de páginas116
  • Contacto del fabricanteno disponible

Comprar usado

Condición: Aceptable
Ex-library with the usual features...
Ver este artículo

EUR 36,72 gastos de envío desde Estados Unidos de America a España

Destinos, gastos y plazos de envío

Otras ediciones populares con el mismo título

9783031012105: Hardware Malware (Synthesis Lectures on Information Security, Privacy, and Trust)

Edición Destacada

ISBN 10:  3031012100 ISBN 13:  9783031012105
Editorial: Springer, 2013
Tapa blanda

Resultados de la búsqueda para Hardware Malware (Synthesis Lectures on Information...

Imagen de archivo

Christian Krieg; Adrian Dabrowski; Heidelinde Hobel; Katharina Krombholz; Edgar Weippl
Publicado por Morgan & Claypool, 2013
ISBN 10: 1627052518 ISBN 13: 9781627052511
Antiguo o usado Soft Cover

Librería: BookOrders, Russell, IA, Estados Unidos de America

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Soft Cover. Condición: Good. Ex-library with the usual features. Library label on front cover. The interior is clean and tight. Binding is good. Cover shows very light wear. Ex-Library. Nº de ref. del artículo: 122030

Contactar al vendedor

Comprar usado

EUR 31,52
Convertir moneda
Gastos de envío: EUR 36,72
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Krieg, Christian,Dabrowski, Adrian,Hobel, Heidelinde,Krombholz, Katharina,Weippl, Edgar
Publicado por Morgan & Claypool Publishers, 2013
ISBN 10: 1627052518 ISBN 13: 9781627052511
Antiguo o usado paperback

Librería: suffolkbooks, Center moriches, NY, Estados Unidos de America

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

paperback. Condición: Very Good. Fast Shipping - Safe and Secure 7 days a week! Nº de ref. del artículo: 3TWOWA001MJH

Contactar al vendedor

Comprar usado

EUR 13,37
Convertir moneda
Gastos de envío: EUR 65,58
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Imagen de archivo

Krieg, Christian, Dabrowski, Adrian, Hobel, Heidelinde, Krom
Publicado por Morgan & Claypool Publishers, 2013
ISBN 10: 1627052518 ISBN 13: 9781627052511
Antiguo o usado paperback

Librería: dsmbooks, Liverpool, Reino Unido

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

paperback. Condición: Very Good. Very Good. book. Nº de ref. del artículo: D8S0-3-M-1627052518-6

Contactar al vendedor

Comprar usado

EUR 101,70
Convertir moneda
Gastos de envío: EUR 31,89
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito