語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hardware Supply Chain Security = Thr...
~
SpringerLink (Online service)
Hardware Supply Chain Security = Threat Modelling, Emerging Attacks and Countermeasures /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Hardware Supply Chain Security/ edited by Basel Halak.
其他題名:
Threat Modelling, Emerging Attacks and Countermeasures /
其他作者:
Halak, Basel.
面頁冊數:
XV, 217 p. 2 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Processor Architectures. -
電子資源:
https://doi.org/10.1007/978-3-030-62707-2
ISBN:
9783030627072
Hardware Supply Chain Security = Threat Modelling, Emerging Attacks and Countermeasures /
Hardware Supply Chain Security
Threat Modelling, Emerging Attacks and Countermeasures /[electronic resource] :edited by Basel Halak. - 1st ed. 2021. - XV, 217 p. 2 illus.online resource.
Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. .
ISBN: 9783030627072
Standard No.: 10.1007/978-3-030-62707-2doiSubjects--Topical Terms:
669787
Processor Architectures.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Hardware Supply Chain Security = Threat Modelling, Emerging Attacks and Countermeasures /
LDR
:02667nam a22003975i 4500
001
1052826
003
DE-He213
005
20210625110041.0
007
cr nn 008mamaa
008
220103s2021 gw | s |||| 0|eng d
020
$a
9783030627072
$9
978-3-030-62707-2
024
7
$a
10.1007/978-3-030-62707-2
$2
doi
035
$a
978-3-030-62707-2
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
245
1 0
$a
Hardware Supply Chain Security
$h
[electronic resource] :
$b
Threat Modelling, Emerging Attacks and Countermeasures /
$c
edited by Basel Halak.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XV, 217 p. 2 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
520
$a
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. .
650
2 4
$a
Processor Architectures.
$3
669787
650
2 4
$a
Professional Computing.
$3
1115983
650
2 4
$a
Cyber-physical systems, IoT.
$3
1226036
650
1 4
$a
Circuits and Systems.
$3
670901
650
0
$a
Microprocessors.
$3
632481
650
0
$a
Computer software.
$3
528062
650
0
$a
Embedded computer systems.
$3
562313
650
0
$a
Internet of things.
$3
1023130
650
0
$a
Computer engineering.
$3
569006
650
0
$a
Electronic circuits.
$3
563332
700
1
$a
Halak, Basel.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1203733
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030627065
776
0 8
$i
Printed edition:
$z
9783030627089
776
0 8
$i
Printed edition:
$z
9783030627096
856
4 0
$u
https://doi.org/10.1007/978-3-030-62707-2
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入