語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hardware supply chain security = thr...
~
Halak, Basel.
FindBook
Google Book
Amazon
博客來
Hardware supply chain security = threat modelling, emerging attacks and countermeasures /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hardware supply chain security/ edited by Basel Halak.
其他題名:
threat modelling, emerging attacks and countermeasures /
其他作者:
Halak, Basel.
出版者:
Cham :Springer International Publishing : : 2021.,
面頁冊數:
xv, 217 p. :ill., digital ;24 cm.
內容註:
Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
Contained By:
Springer Nature eBook
標題:
Electronic circuits. -
電子資源:
https://doi.org/10.1007/978-3-030-62707-2
ISBN:
9783030627072
Hardware supply chain security = threat modelling, emerging attacks and countermeasures /
Hardware supply chain security
threat modelling, emerging attacks and countermeasures /[electronic resource] :edited by Basel Halak. - Cham :Springer International Publishing :2021. - xv, 217 p. :ill., digital ;24 cm.
Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.
ISBN: 9783030627072
Standard No.: 10.1007/978-3-030-62707-2doiSubjects--Topical Terms:
528097
Electronic circuits.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Hardware supply chain security = threat modelling, emerging attacks and countermeasures /
LDR
:02314nmm a2200325 a 4500
001
2238214
003
DE-He213
005
20210520101920.0
006
m d
007
cr nn 008maaau
008
211111s2021 sz s 0 eng d
020
$a
9783030627072
$q
(electronic bk.)
020
$a
9783030627065
$q
(paper)
024
7
$a
10.1007/978-3-030-62707-2
$2
doi
035
$a
978-3-030-62707-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
090
$a
TK7888.4
$b
.H267 2021
245
0 0
$a
Hardware supply chain security
$h
[electronic resource] :
$b
threat modelling, emerging attacks and countermeasures /
$c
edited by Basel Halak.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xv, 217 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
520
$a
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.
650
0
$a
Electronic circuits.
$3
528097
650
0
$a
Computer engineering.
$3
621879
650
0
$a
Internet of things.
$3
2057703
650
0
$a
Embedded computer systems.
$3
582088
650
0
$a
Computer software.
$3
560056
650
0
$a
Microprocessors.
$3
517143
650
1 4
$a
Circuits and Systems.
$3
896527
650
2 4
$a
Cyber-physical systems, IoT.
$3
3386699
650
2 4
$a
Professional Computing.
$3
3201325
650
2 4
$a
Processor Architectures.
$3
892680
700
1
$a
Halak, Basel.
$3
3321500
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-62707-2
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9400099
電子資源
11.線上閱覽_V
電子書
EB TK7888.4
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入