The Hardware Trojan War

Attacks, Myths, and Defenses

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Networking & Communications, Computer Security
Cover of the book The Hardware Trojan War by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319685113
Publisher: Springer International Publishing Publication: November 29, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319685113
Publisher: Springer International Publishing
Publication: November 29, 2017
Imprint: Springer
Language: English

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

More books from Springer International Publishing

Cover of the book Biomolecular Interfaces by
Cover of the book Surgeons as Educators by
Cover of the book The Romance of Science: Essays in Honour of Trevor H. Levere by
Cover of the book Crisis Management in Acute Care Settings by
Cover of the book Ubiquitous Computing and Ambient Intelligence by
Cover of the book Protecting Children Against Bullying and Its Consequences by
Cover of the book Peak-to-Peak Output Current Ripple Analysis in Multiphase and Multilevel Inverters by
Cover of the book Innovations in Molecular Mechanisms and Tissue Engineering by
Cover of the book Formation, Evolution, and Dynamics of Young Solar Systems by
Cover of the book Economic Transformation and Business Opportunities in Asia by
Cover of the book Parameter Estimation in Fractional Diffusion Models by
Cover of the book Shakespeare and Conceptual Blending by
Cover of the book Rhetorical Audience Studies and Reception of Rhetoric by
Cover of the book Service-Oriented Computing – ICSOC 2018 Workshops by
Cover of the book Mathematical Control Theory II by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy