Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hardware supply chain securitythreat...
~
Halak, Basel.
Hardware supply chain securitythreat modelling, emerging attacks and countermeasures /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hardware supply chain securityedited by Basel Halak.
Reminder of title:
threat modelling, emerging attacks and countermeasures /
other author:
Halak, Basel.
Published:
Cham :Springer International Publishing :2021.
Description:
xv, 217 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Electronic circuits.
Online resource:
https://doi.org/10.1007/978-3-030-62707-2
ISBN:
9783030627072$q(electronic bk.)
Hardware supply chain securitythreat modelling, emerging attacks and countermeasures /
Hardware supply chain security
threat modelling, emerging attacks and countermeasures /[electronic resource] :edited by Basel Halak. - Cham :Springer International Publishing :2021. - xv, 217 p. :ill., digital ;24 cm.
Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.
ISBN: 9783030627072$q(electronic bk.)
Standard No.: 10.1007/978-3-030-62707-2doiSubjects--Topical Terms:
182223
Electronic circuits.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Hardware supply chain securitythreat modelling, emerging attacks and countermeasures /
LDR
:02314nmm a2200325 a 4500
001
600411
003
DE-He213
005
20210520101920.0
006
m d
007
cr nn 008maaau
008
211104s2021 sz s 0 eng d
020
$a
9783030627072$q(electronic bk.)
020
$a
9783030627065$q(paper)
024
7
$a
10.1007/978-3-030-62707-2
$2
doi
035
$a
978-3-030-62707-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
090
$a
TK7888.4
$b
.H267 2021
245
0 0
$a
Hardware supply chain security
$h
[electronic resource] :
$b
threat modelling, emerging attacks and countermeasures /
$c
edited by Basel Halak.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xv, 217 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
520
$a
This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.
650
0
$a
Electronic circuits.
$3
182223
650
0
$a
Computer engineering.
$3
212944
650
0
$a
Internet of things.
$3
670954
650
0
$a
Embedded computer systems.
$3
184402
650
0
$a
Computer software.
$3
180007
650
0
$a
Microprocessors.
$3
182447
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Cyber-physical systems, IoT.
$3
836359
650
2 4
$a
Professional Computing.
$3
763344
650
2 4
$a
Processor Architectures.
$3
274498
700
1
$a
Halak, Basel.
$3
814908
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-62707-2
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000198945
電子館藏
1圖書
電子書
EB TK7888.4 .H267 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-62707-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login