The Hardware Trojan War

Attacks, Myths, and Defenses

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Networking & Communications, Computer Security
Cover of the book The Hardware Trojan War by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319685113
Publisher: Springer International Publishing Publication: November 29, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319685113
Publisher: Springer International Publishing
Publication: November 29, 2017
Imprint: Springer
Language: English

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

More books from Springer International Publishing

Cover of the book Frugal Innovation in Healthcare by
Cover of the book Cauchy Problem for Differential Operators with Double Characteristics by
Cover of the book Advances in Information Retrieval by
Cover of the book Roles, Trust, and Reputation in Social Media Knowledge Markets by
Cover of the book New Luxury Management by
Cover of the book Information Technology for Management by
Cover of the book The Irish Abortion Journey, 1920–2018 by
Cover of the book China’s Intellectual Property Regime for Innovation by
Cover of the book Elise Boulding: A Pioneer in Peace Research, Peacemaking, Feminism, Future Studies and the Family by
Cover of the book Electromagnetic Foundations of Solar Radiation Collection by
Cover of the book Highlighting the Importance of Big Data Management and Analysis for Various Applications by
Cover of the book Capillary Electrophoresis-Mass Spectrometry by
Cover of the book Advances in Characterization and Analysis of Expansive Soils and Rocks by
Cover of the book Philosophy of Olfactory Perception by
Cover of the book Trust and Crisis Management in the European Union by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy