語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Understanding analog side channels u...
~
Zajic, Alenka.
FindBook
Google Book
Amazon
博客來
Understanding analog side channels using cryptography algorithms
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Understanding analog side channels using cryptography algorithms/ by Alenka Zajic, Milos Prvulovic.
作者:
Zajic, Alenka.
其他作者:
Prvulovic, Milos.
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
xvi, 467 p. :ill., digital ;24 cm.
內容註:
Preface -- I Introduction -- Ii What Is An Analog Side Channel? -- Iii Analog Side Channels -- Iv Unintentionally Modulated Side Channels -- V Relationship Between Modulated Side Channels And Program Activity -- Vi Parameters That Affect Analog Side Channels -- Vii Modeling Analog Side Channels as Communication Systems -- Viii Using Analog Side-Channels For Malware Detection -- Ix Using Analog Side Channels For Program Profiling -- X Using Analog Side Channels For Hardware Event Profiling -- Xi Using Analog Side Channels for Hardware/Software Attestation -- Xii Using Analog Side Channels For Hardware Identification -- Xiii Using Analog Side Channels To Attack Cryptographic Implementations -- Xiv Using Analog Side Channels For Hardware Trojan Detection.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-031-38579-7
ISBN:
9783031385797
Understanding analog side channels using cryptography algorithms
Zajic, Alenka.
Understanding analog side channels using cryptography algorithms
[electronic resource] /by Alenka Zajic, Milos Prvulovic. - Cham :Springer International Publishing :2023. - xvi, 467 p. :ill., digital ;24 cm.
Preface -- I Introduction -- Ii What Is An Analog Side Channel? -- Iii Analog Side Channels -- Iv Unintentionally Modulated Side Channels -- V Relationship Between Modulated Side Channels And Program Activity -- Vi Parameters That Affect Analog Side Channels -- Vii Modeling Analog Side Channels as Communication Systems -- Viii Using Analog Side-Channels For Malware Detection -- Ix Using Analog Side Channels For Program Profiling -- X Using Analog Side Channels For Hardware Event Profiling -- Xi Using Analog Side Channels for Hardware/Software Attestation -- Xii Using Analog Side Channels For Hardware Identification -- Xiii Using Analog Side Channels To Attack Cryptographic Implementations -- Xiv Using Analog Side Channels For Hardware Trojan Detection.
This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection. Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program's algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood. This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.
ISBN: 9783031385797
Standard No.: 10.1007/978-3-031-38579-7doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Understanding analog side channels using cryptography algorithms
LDR
:03764nmm a2200349 a 4500
001
2334485
003
DE-He213
005
20230930184649.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031385797
$q
(electronic bk.)
020
$a
9783031385780
$q
(paper)
024
7
$a
10.1007/978-3-031-38579-7
$2
doi
035
$a
978-3-031-38579-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
Z21 2023
100
1
$a
Zajic, Alenka.
$3
3666087
245
1 0
$a
Understanding analog side channels using cryptography algorithms
$h
[electronic resource] /
$c
by Alenka Zajic, Milos Prvulovic.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
xvi, 467 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Preface -- I Introduction -- Ii What Is An Analog Side Channel? -- Iii Analog Side Channels -- Iv Unintentionally Modulated Side Channels -- V Relationship Between Modulated Side Channels And Program Activity -- Vi Parameters That Affect Analog Side Channels -- Vii Modeling Analog Side Channels as Communication Systems -- Viii Using Analog Side-Channels For Malware Detection -- Ix Using Analog Side Channels For Program Profiling -- X Using Analog Side Channels For Hardware Event Profiling -- Xi Using Analog Side Channels for Hardware/Software Attestation -- Xii Using Analog Side Channels For Hardware Identification -- Xiii Using Analog Side Channels To Attack Cryptographic Implementations -- Xiv Using Analog Side Channels For Hardware Trojan Detection.
520
$a
This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection. Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program's algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood. This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.
650
0
$a
Computer security.
$3
540555
650
0
$a
Hardware Trojans (Computers)
$3
2055839
650
0
$a
Cryptography.
$3
532586
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Communications Engineering, Networks.
$3
891094
700
1
$a
Prvulovic, Milos.
$3
3666088
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-38579-7
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9460690
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入