000 -LEADER |
fixed length control field |
06107nam a2200781 i 4500 |
001 - CONTROL NUMBER |
control field |
6813206 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200413152911.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131016s2013 caua foab 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781627052528 |
Qualifying information |
electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781627052511 |
Qualifying information |
pbk. |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.2200/S00530ED1V01Y201308SPT006 |
Source of number or code |
doi |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00402796 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)860909294 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.76.C68 |
Item number |
K754 2013 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
|
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
MoCl |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Krieg, Christian., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Hardware malware / |
Statement of responsibility, etc. |
Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : |
Name of producer, publisher, distributor, manufacturer |
Morgan & Claypool, |
Date of production, publication, distribution, manufacture, or copyright notice |
2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 PDF (xi, 103 pages) : |
Other physical details |
illustrations. |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
electronic |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Synthesis lectures on information security, privacy, and trust, |
International Standard Serial Number |
1945-9750 ; |
Volume/sequential designation |
# 6 |
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat Reader. |
500 ## - GENERAL NOTE |
General note |
Part of: Synthesis digital library of engineering and computer science. |
500 ## - GENERAL NOTE |
General note |
Series from website. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 91-100). |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction -- 1.1 Motivation -- 1.2 Background -- 1.3 Production process of hardware systems -- 1.3.1 Workflow -- 1.3.2 Vulnerabilities -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
2. Hardware Trojans -- 2.1 Components -- 2.1.1 Triggers -- 2.1.2 Payload -- 2.1.3 Interfaces -- 2.2 Types -- 2.3 Attack parameters -- 2.3.1 Level of abstraction -- 2.3.2 Technology domain -- 2.3.3 Target technology -- 2.3.4 Injection phase -- 2.3.5 Attackers -- 2.3.6 Topology -- 2.4 Metrics -- 2.4.1 Structural complexity -- 2.4.2 Impacts -- 2.4.3 Attack probability -- 2.4.4 Activation probability -- 2.4.5 Implementation costs -- 2.4.6 Detection costs -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
3. Countermeasures -- 3.1 Introduction and challenges -- 3.2 Detection -- 3.2.1 Formal verification -- 3.2.2 Simulation -- 3.2.3 Logic testing -- 3.2.4 Side-channel analysis -- 3.2.5 Invasion -- 3.3 Localization -- 3.3.1 Activation -- 3.3.2 Mensuration -- 3.3.3 Calculation -- 3.4 Prevention -- 3.4.1 Obfuscation -- 3.4.2 Invasion -- 3.5 Circumventing Trojan countermeasures -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
4. Historical overview -- 4.1 Hardware Trojans: the beginnings (2005-2008) -- 4.2 Hardware Trojans: a flood of research (2009-2010) -- 4.3 A reflection on current approaches (2011-2012) -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
5. Hot topics and conclusions -- 5.1 Hot topics in hardware security and trust -- 5.2 Conclusions -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Glossary -- Bibliography -- Authors' biographies. |
506 1# - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Abstract freely available; full-text restricted to subscribers or individual document purchasers. |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Compendex |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
INSPEC |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google scholar |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google book search |
520 3# - SUMMARY, ETC. |
Summary, etc. |
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in print. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on October 16, 2013). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hardware Trojans (Computers) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer viruses. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
hardware Trojan |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
hardware security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
logic testing |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
formal verification |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
side-channel analysis |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
hardware Trojan taxonomy |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
attacker taxonomy |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
attack taxonomy |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
counter-measures taxonomy |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Dabrowski, Adrian., |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hobel, Heidelinde., |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Krombholz, Katharina., |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Weippl, Edgar R., |
Relator term |
author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781627052511 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis digital library of engineering and computer science. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis lectures on information security, privacy, and trust ; |
Volume/sequential designation |
# 6. |
International Standard Serial Number |
1945-9750 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to resource |
Uniform Resource Identifier |
http://ieeexplore.ieee.org/servlet/opac?bknumber=6813206 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to full text |
Uniform Resource Identifier |
http://dx.doi.org/10.2200/S00530ED1V01Y201308SPT006 |