000 | 03181nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-030-62707-2 | ||
003 | DE-He213 | ||
005 | 20220801220215.0 | ||
007 | cr nn 008mamaa | ||
008 | 210204s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030627072 _9978-3-030-62707-2 |
||
024 | 7 |
_a10.1007/978-3-030-62707-2 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
245 | 1 | 0 |
_aHardware Supply Chain Security _h[electronic resource] : _bThreat Modelling, Emerging Attacks and Countermeasures / _cedited by Basel Halak. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXV, 217 p. 2 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPart I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System. | |
520 | _aThis book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. . | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aInternet of things. _94027 |
|
650 | 0 |
_aMicroprocessors. _948945 |
|
650 | 0 |
_aComputer architecture. _93513 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _948946 |
650 | 2 | 4 |
_aInternet of Things. _94027 |
650 | 2 | 4 |
_aProcessor Architectures. _948947 |
700 | 1 |
_aHalak, Basel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _948948 |
|
710 | 2 |
_aSpringerLink (Online service) _948949 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030627065 |
776 | 0 | 8 |
_iPrinted edition: _z9783030627089 |
776 | 0 | 8 |
_iPrinted edition: _z9783030627096 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-62707-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c78319 _d78319 |