Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Hardware malware / (Record no. 562023)

000 -LEADER
fixed length control field 06107nam a2200781 i 4500
001 - CONTROL NUMBER
control field 6813206
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152911.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131016s2013 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627052528
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627052511
Qualifying information pbk.
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00530ED1V01Y201308SPT006
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00402796
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)860909294
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.C68
Item number K754 2013
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR)
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) MoCl
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Krieg, Christian.,
Relator term author.
245 10 - TITLE STATEMENT
Title Hardware malware /
Statement of responsibility, etc. Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2013.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xi, 103 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, and trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 6
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
500 ## - GENERAL NOTE
General note Series from website.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 91-100).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 Motivation -- 1.2 Background -- 1.3 Production process of hardware systems -- 1.3.1 Workflow -- 1.3.2 Vulnerabilities --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Hardware Trojans -- 2.1 Components -- 2.1.1 Triggers -- 2.1.2 Payload -- 2.1.3 Interfaces -- 2.2 Types -- 2.3 Attack parameters -- 2.3.1 Level of abstraction -- 2.3.2 Technology domain -- 2.3.3 Target technology -- 2.3.4 Injection phase -- 2.3.5 Attackers -- 2.3.6 Topology -- 2.4 Metrics -- 2.4.1 Structural complexity -- 2.4.2 Impacts -- 2.4.3 Attack probability -- 2.4.4 Activation probability -- 2.4.5 Implementation costs -- 2.4.6 Detection costs --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Countermeasures -- 3.1 Introduction and challenges -- 3.2 Detection -- 3.2.1 Formal verification -- 3.2.2 Simulation -- 3.2.3 Logic testing -- 3.2.4 Side-channel analysis -- 3.2.5 Invasion -- 3.3 Localization -- 3.3.1 Activation -- 3.3.2 Mensuration -- 3.3.3 Calculation -- 3.4 Prevention -- 3.4.1 Obfuscation -- 3.4.2 Invasion -- 3.5 Circumventing Trojan countermeasures --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Historical overview -- 4.1 Hardware Trojans: the beginnings (2005-2008) -- 4.2 Hardware Trojans: a flood of research (2009-2010) -- 4.3 A reflection on current approaches (2011-2012) --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Hot topics and conclusions -- 5.1 Hot topics in hardware security and trust -- 5.2 Conclusions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Glossary -- Bibliography -- Authors' biographies.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on October 16, 2013).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hardware Trojans (Computers)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer viruses.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term hardware Trojan
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term hardware security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term logic testing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term formal verification
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side-channel analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term hardware Trojan taxonomy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term attacker taxonomy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term attack taxonomy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term counter-measures taxonomy
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Dabrowski, Adrian.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hobel, Heidelinde.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Krombholz, Katharina.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Weippl, Edgar R.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627052511
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust ;
Volume/sequential designation # 6.
International Standard Serial Number 1945-9750
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6813206
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to full text
Uniform Resource Identifier http://dx.doi.org/10.2200/S00530ED1V01Y201308SPT006
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE523 2020-04-13 2020-04-13 E books

Powered by Koha