Articles liés à Hardware Malware

9781627052511: Hardware Malware

Synopsis

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.

Table of Contents: List of Figures / Introduction / Hardware Trojans / Countermeasures / Historical Overview / Hot Topics and Conclusions / Glossary / Bibliography / Authors' Biographies

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

Présentation de l'éditeur

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.

Table of Contents: List of Figures / Introduction / Hardware Trojans / Countermeasures / Historical Overview / Hot Topics and Conclusions / Glossary / Bibliography / Authors' Biographies

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

  • ÉditeurMorgan & Claypool Publishers
  • Date d'édition2013
  • ISBN 10 1627052518
  • ISBN 13 9781627052511
  • ReliureBroché
  • Langueanglais
  • Nombre de pages116
  • Coordonnées du fabricantnon disponible

Acheter D'occasion

état :  Satisfaisant
Ex-library with the usual features...
Afficher cet article
EUR 31,07

Autre devise

EUR 36,19 expédition depuis Etats-Unis vers France

Destinations, frais et délais

Autres éditions populaires du même titre

9783031012105: Hardware Malware

Edition présentée

ISBN 10 :  3031012100 ISBN 13 :  9783031012105
Editeur : Springer, 2013
Couverture souple

Résultats de recherche pour Hardware Malware

Image d'archives

Christian Krieg; Adrian Dabrowski; Heidelinde Hobel; Katharina Krombholz; Edgar Weippl
Edité par Morgan & Claypool, 2013
ISBN 10 : 1627052518 ISBN 13 : 9781627052511
Ancien ou d'occasion Soft Cover

Vendeur : BookOrders, Russell, IA, Etats-Unis

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

Soft Cover. Etat : Good. Ex-library with the usual features. Library label on front cover. The interior is clean and tight. Binding is good. Cover shows very light wear. Ex-Library. N° de réf. du vendeur 122030

Contacter le vendeur

Acheter D'occasion

EUR 31,07
Autre devise
Frais de port : EUR 36,19
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier

Image d'archives

Krieg, Christian,Dabrowski, Adrian,Hobel, Heidelinde,Krombholz, Katharina,Weippl, Edgar
Edité par Morgan & Claypool Publishers, 2013
ISBN 10 : 1627052518 ISBN 13 : 9781627052511
Ancien ou d'occasion paperback

Vendeur : suffolkbooks, Center moriches, NY, Etats-Unis

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

paperback. Etat : Very Good. Fast Shipping - Safe and Secure 7 days a week! N° de réf. du vendeur 3TWOWA001MJH

Contacter le vendeur

Acheter D'occasion

EUR 13,18
Autre devise
Frais de port : EUR 64,63
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : 3 disponible(s)

Ajouter au panier

Image d'archives

Krieg, Christian, Dabrowski, Adrian, Hobel, Heidelinde, Krom
Edité par Morgan & Claypool Publishers, 2013
ISBN 10 : 1627052518 ISBN 13 : 9781627052511
Ancien ou d'occasion paperback

Vendeur : dsmbooks, Liverpool, Royaume-Uni

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

paperback. Etat : Very Good. Very Good. book. N° de réf. du vendeur D8S0-3-M-1627052518-6

Contacter le vendeur

Acheter D'occasion

EUR 100,24
Autre devise
Frais de port : EUR 29,36
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier