Hardware Malware (Synthesis Lectures on Information Security, Privacy, and Tru)
暫譯: 硬體惡意程式(資訊安全、隱私與信任合成講座)
Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, Edgar Weippl
- 出版商: Morgan & Claypool
- 出版日期: 2013-09-01
- 售價: $1,600
- 貴賓價: 9.5 折 $1,520
- 語言: 英文
- 頁數: 116
- 裝訂: Paperback
- ISBN: 1627052518
- ISBN-13: 9781627052511
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
相關主題
商品描述
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.
Table of Contents: List of Figures / Introduction / Hardware Trojans / Countermeasures / Historical Overview / Hot Topics and Conclusions / Glossary / Bibliography / Authors' Biographies
商品描述(中文翻譯)
在我們的數位世界中,集成電路幾乎存在於我們日常生活的每一個時刻。即使是在早上使用咖啡機,或是開車上班時,我們也在與集成電路互動。資訊科技在工業化世界幾乎所有生活領域的日益普及,提供了廣泛的攻擊向量。到目前為止,主要考慮和研究的是基於軟體的攻擊,而基於硬體的攻擊則相對較少受到關注。由於財務和物流原因,集成電路的設計和生產過程大多是去中心化的。因此,在硬體開發生命週期中,參與方之間必須建立高度的信任。在複雜的生產鏈中,惡意攻擊者可以通過利用不受信任的過程和後門插入未指定的功能。本研究探討了如何將這種隱藏的、未指定的功能引入硬體系統。在簡要概述硬體系統的開發和生產過程後,我們系統性地描述了一種新型威脅——硬體特洛伊木馬。我們提供了該領域研究活動發展的歷史概述,以顯示國際研究對此主題日益增長的興趣。我們更詳細地考慮當前的工作,討論構成硬體特洛伊木馬的組件以及與攻擊相關的參數。此外,我們描述了當前檢測、定位和避免硬體特洛伊木馬的各種方法,以有效對抗它們。此外,本研究開發了一個全面的對策分類法,並詳細解釋了如何解決特定問題。在最後一步中,我們提供了相關工作的概述,並對該領域的進一步研究提供展望。
目錄:圖表清單 / 引言 / 硬體特洛伊木馬 / 對策 / 歷史概述 / 熱門主題與結論 / 詞彙表 / 參考文獻 / 作者簡介