Muutke küpsiste eelistusi

E-raamat: Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures

Edited by
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 04-Feb-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030627072
  • Formaat - EPUB+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 04-Feb-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030627072

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book presents a new threat modelling approach that specifically target hardware supply chain, covering security risks throughout the lifecycle of an electronic system. Afterword’s the book  presents a case study on a new combined security attack, which combines two forms of attack’s mechanisms, from two different stages of the IC supply chain, more specifically the attack target the newly developed light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan.  The book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

The book will educate the readers on the security challenges in this area and the emerging countermeasures, in particular:

  • It presents a new threat modelling approach, developed specifically for the hardware supply chain;
  • It provides a systematic security analysis of the IC supply chain, which includes the latest attacks, countermeasures and security validation techniques;
  • It presents a detailed case study of new forms of threats that combine multiple attack’s vectors, supported by FPGA demonstration and experimental analysis;
  • It provides an in-depth discussion of emerging solutions to protect lightweight electronics devices from counterfeiting;
  • It presents the state-of-the-art machine learning techniques that allows the detection of anomalous behaviors of electronic systems.


Part I Threat Modelling of Hardware Supply Chain
1 CIST: A Threat Modelling Approach for Hardware Supply Chain Security
3(66)
Basel Halak
Part II Emerging Hardware-Based Security Attacks and Countermeasures
2 A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
69(20)
Jorge E. Duarte-Sanchez
Basel Halak
3 Anti-counterfeiting Techniques for Resources-Constrained Devices
89(40)
Yildiran Yilmaz
Viet-Hoa Do
Basel Halak
Part III Anomaly Detection in Embedded Systems
4 Anomalous Behaviour in Embedded Systems
129(18)
Lai Leng Woo
5 Hardware Performance Counters (HPCs) for Anomaly Detection
147(20)
Lai Leng Woo
6 Anomaly Detection in an Embedded System
167(46)
Lai Leng Woo
Mark Zwolinski
Basel Halak
Index 213
Dr Basel Halak is the director of the embedded systems and IoT program at the University of Southampton, a visiting scholar at the Technical University of Kaiserslautern, a visiting professor at the Kazakh-British Technical University, a fellow of the royal academy of engineering, a national teaching fellow of Advance HE in the UK, and a senior fellow of the higher education academy. He has written over 80-refereed conference and journal papers, and authored two books, including the first textbook on Physically Unclonable Functions. His research expertise include evaluation of security of hardware devices, development of appropriate countermeasures, the development of mathematical formalisms of reliability issues in CMOS circuits (e.g. crosstalk, radiation, ageing), and the use of fault tolerance techniques to improve the robustness of electronics systems against such issues.. Dr Halak lectures on digital design, Secure Hardware and Cryptography.  He is also leading European Masters in Embedded Computing Systems (EMECS) , a two year course run in collaboration with Kaiserslautern University in Germany and the Norwegian University of Science and Technology in Trondheim (electronics and communication). Dr Halak serves on several technical program committees such as HOST, IEEE DATE, IVSW, ICCCA, ICCCS, MTV and EWME. He is an associate editor of IEEE access and an editor of the IET circuit devices and system journal. He is also a member of the hardware security-working group of the World Wide Web Consortium (W3C).