|
|
1 | (10) |
|
|
2 | (1) |
|
1.2 What Are We Afraid Of? |
|
|
2 | (2) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
1.6 Trust in Vendors Is Different from Computer Security |
|
|
6 | (1) |
|
1.7 Why the Problem Is Important |
|
|
7 | (1) |
|
|
8 | (3) |
|
|
9 | (2) |
|
|
11 | (10) |
|
|
11 | (2) |
|
2.2 Trust and Game Theory |
|
|
13 | (1) |
|
2.3 Trust and Freedom of Choice |
|
|
14 | (1) |
|
2.4 Trust, Consequence, and Situation |
|
|
14 | (1) |
|
|
15 | (1) |
|
2.6 Trusted Computing Base; Trust Between Components |
|
|
16 | (1) |
|
|
17 | (4) |
|
|
18 | (3) |
|
|
21 | (10) |
|
3.1 Transistors and Integrated Circuits |
|
|
21 | (1) |
|
3.2 Memory and Communication |
|
|
22 | (1) |
|
3.3 Processors and Instruction Sets |
|
|
23 | (1) |
|
|
24 | (1) |
|
3.5 Operating Systems, Device Drivers, Hardware Adaptation Layers, and Hypervisors |
|
|
25 | (1) |
|
3.6 Bytecode Interpreters |
|
|
26 | (1) |
|
3.7 The Application on Top |
|
|
26 | (1) |
|
3.8 Infrastructures and Distributed Systems |
|
|
27 | (1) |
|
|
28 | (3) |
|
|
29 | (2) |
|
4 Development of ICT Systems |
|
|
31 | (8) |
|
|
31 | (3) |
|
|
34 | (1) |
|
4.3 Security Updates and Maintenance |
|
|
35 | (1) |
|
|
36 | (3) |
|
|
37 | (2) |
|
|
39 | (8) |
|
5.1 Godel and the Liar's Paradox |
|
|
39 | (1) |
|
5.2 Turing and the Halting Problem |
|
|
40 | (1) |
|
5.3 Decidability of Malicious Behaviour |
|
|
41 | (2) |
|
|
43 | (1) |
|
5.5 Where Does This Lead Us? |
|
|
44 | (3) |
|
|
45 | (2) |
|
6 Reverse Engineering of Code |
|
|
47 | (10) |
|
6.1 Application of Reverse Engineering in ICT |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (4) |
|
|
54 | (3) |
|
7 Static Detection of Malware |
|
|
57 | (10) |
|
|
57 | (2) |
|
7.2 Signatures and Static Code Analysis |
|
|
59 | (1) |
|
7.3 Encrypted and Oligomorphic Malware |
|
|
59 | (1) |
|
7.4 Obfuscation Techniques |
|
|
60 | (2) |
|
7.5 Polymorphic and Metamorphic Malware |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
7.8 Specification-Based Techniques |
|
|
64 | (1) |
|
|
64 | (3) |
|
|
65 | (2) |
|
8 Dynamic Detection Methods |
|
|
67 | (8) |
|
|
67 | (1) |
|
8.2 Unrestricted Execution |
|
|
68 | (1) |
|
8.3 Emulator-Based Analysis |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (3) |
|
|
73 | (2) |
|
|
75 | (12) |
|
|
75 | (2) |
|
|
77 | (1) |
|
9.3 Programming Languages |
|
|
78 | (1) |
|
9.4 Hybrid Programming and Specification Languages |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
9.7 Theorem Proving and Model Checking |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (5) |
|
|
83 | (4) |
|
10 Software Quality and Quality Management |
|
|
87 | (12) |
|
10.1 What is Software Quality Management? |
|
|
87 | (1) |
|
10.2 Software Development Process |
|
|
88 | (1) |
|
10.3 Software Quality Models |
|
|
89 | (1) |
|
10.4 Software Quality Management |
|
|
90 | (1) |
|
10.5 Software Quality Metrics |
|
|
90 | (1) |
|
|
91 | (1) |
|
10.7 Common Criteria (ISO/TEC 15408) |
|
|
92 | (1) |
|
|
93 | (1) |
|
10.9 Verification Through Formal Methods |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (4) |
|
|
96 | (3) |
|
11 Containment of Untrusted Modules |
|
|
99 | (10) |
|
|
99 | (1) |
|
11.2 Partial Failures and Fault Models |
|
|
100 | (1) |
|
11.3 Erlang: A Programming Language Supporting Containment |
|
|
101 | (1) |
|
11.4 Microservices: An Architecture Model Supporting Containment |
|
|
102 | (2) |
|
11.5 Hardware Containment |
|
|
104 | (1) |
|
|
104 | (5) |
|
|
106 | (3) |
|
12 Summary and Way Forward |
|
|
109 | |
|
|
109 | (3) |
|
|
112 | (3) |
|
|
112 | (1) |
|
|
113 | (1) |
|
12.2.3 Heterogeneity and Containment |
|
|
114 | (1) |
|
|
115 | |