Verwandte Artikel zu Hardware Malware (Synthesis Lectures on Information...

Hardware Malware (Synthesis Lectures on Information Security, Privacy, and Trust) - Softcover

 
9781627052511: Hardware Malware (Synthesis Lectures on Information Security, Privacy, and Trust)

Inhaltsangabe

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.

Table of Contents: List of Figures / Introduction / Hardware Trojans / Countermeasures / Historical Overview / Hot Topics and Conclusions / Glossary / Bibliography / Authors' Biographies

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Reseña del editor

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field. Table of Contents: List of Figures / Introduction / Hardware Trojans / Countermeasures / Historical Overview / Hot Topics and Conclusions / Glossary / Bibliography / Authors' Biographies

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Gebraucht kaufen

Zustand: Befriedigend
Ex-library with the usual features...
Diesen Artikel anzeigen

EUR 35,58 für den Versand von USA nach Deutschland

Versandziele, Kosten & Dauer

Weitere beliebte Ausgaben desselben Titels

9783031012105: Hardware Malware (Synthesis Lectures on Information Security, Privacy, and Trust)

Vorgestellte Ausgabe

ISBN 10:  3031012100 ISBN 13:  9783031012105
Verlag: Springer, 2013
Softcover

Suchergebnisse für Hardware Malware (Synthesis Lectures on Information...

Beispielbild für diese ISBN

Christian Krieg; Adrian Dabrowski; Heidelinde Hobel; Katharina Krombholz; Edgar Weippl
Verlag: Morgan & Claypool, 2013
ISBN 10: 1627052518 ISBN 13: 9781627052511
Gebraucht Soft Cover

Anbieter: BookOrders, Russell, IA, USA

Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Soft Cover. Zustand: Good. Ex-library with the usual features. Library label on front cover. The interior is clean and tight. Binding is good. Cover shows very light wear. Ex-Library. Bestandsnummer des Verkäufers 122030

Verkäufer kontaktieren

Gebraucht kaufen

EUR 30,54
Währung umrechnen
Versand: EUR 35,58
Von USA nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Krieg, Christian,Dabrowski, Adrian,Hobel, Heidelinde,Krombholz, Katharina,Weippl, Edgar
ISBN 10: 1627052518 ISBN 13: 9781627052511
Gebraucht paperback

Anbieter: suffolkbooks, Center moriches, NY, USA

Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

paperback. Zustand: Very Good. Fast Shipping - Safe and Secure 7 days a week! Bestandsnummer des Verkäufers 3TWOWA001MJH

Verkäufer kontaktieren

Gebraucht kaufen

EUR 12,95
Währung umrechnen
Versand: EUR 63,53
Von USA nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 3 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Krieg, Christian, Dabrowski, Adrian, Hobel, Heidelinde, Krom
ISBN 10: 1627052518 ISBN 13: 9781627052511
Gebraucht paperback

Anbieter: dsmbooks, Liverpool, Vereinigtes Königreich

Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

paperback. Zustand: Very Good. Very Good. book. Bestandsnummer des Verkäufers D8S0-3-M-1627052518-6

Verkäufer kontaktieren

Gebraucht kaufen

EUR 98,53
Währung umrechnen
Versand: EUR 29,11
Von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb