书目名称 | The Hardware Trojan War | 副标题 | Attacks, Myths, and | 编辑 | Swarup Bhunia,Mark M.‘Tehranipoor | 视频video | | 概述 | Explains details of hardware Trojan attacks and associated trust issues, including threat models/instances, attack surfaces, adversaries, and all sorts of protection approaches.Covers Trojan threats a | 图书封面 |  | 描述 | .This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated with hardware Trojan attacks and presents practical attack space in the scope of current business models and practices. It covers the threat of hardware Trojan attacks for all attack surfaces; presents attack models, types and scenarios; discusses trust metrics; presents different forms of protection approaches – both proactive and reactive; provides insight on current industrial practices; and finally, describes emerging attack modes, defenses and future research pathways.. | 出版日期 | Book 2018 | 关键词 | Counterfeit electronics; Counterfeit integrated circuit; Hardware Trojan Attacks; Trust Verification of | 版次 | 1 | doi | https://doi.org/10.1007/978-3-319-68511-3 | isbn_softcover | 978-3-319-88614-5 | isbn_ebook | 978-3-319-68511-3 | copyright | Springer International Publishing AG 2018 |
The information of publication is updating
|
|