The Hardware Trojan War

Attacks, Myths, and Defenses

Nonfiction, Science & Nature, Technology, Electronics, Circuits, Computers, Networking & Communications, Computer Security
Cover of the book The Hardware Trojan War by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319685113
Publisher: Springer International Publishing Publication: November 29, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319685113
Publisher: Springer International Publishing
Publication: November 29, 2017
Imprint: Springer
Language: English

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.

More books from Springer International Publishing

Cover of the book Living With Hacktivism by
Cover of the book Fundamentals of Functional Analysis by
Cover of the book Human Trafficking Is a Public Health Issue by
Cover of the book Inflammatory Disorders by
Cover of the book Green, Pervasive, and Cloud Computing by
Cover of the book Advanced Takagi‒Sugeno Fuzzy Systems by
Cover of the book Hollywood in Crisis or: The Collapse of the Real by
Cover of the book Management of Deep Carious Lesions by
Cover of the book Multiscale Modeling of Heterogeneous Structures by
Cover of the book Renormalization Group Analysis of Equilibrium and Non-equilibrium Charged Systems by
Cover of the book LQG for the Bewildered by
Cover of the book Ordering Phenomena in Rare-Earth Nickelate Heterostructures by
Cover of the book Reviews of Environmental Contamination and Toxicology Volume 228 by
Cover of the book Imaging of Complications and Toxicity following Tumor Therapy by
Cover of the book Advances in Reconfigurable Mechanisms and Robots II by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy