0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Detecting Peripheral-based Attacks on the Host Memory (Hardcover, 2015 ed.) Loot Price: R2,855
Discovery Miles 28 550
Detecting Peripheral-based Attacks on the Host Memory (Hardcover, 2015 ed.): Patrick Stewin

Detecting Peripheral-based Attacks on the Host Memory (Hardcover, 2015 ed.)

Patrick Stewin

Series: T-Labs Series in Telecommunication Services

 (sign in to rate)
Loot Price R2,855 Discovery Miles 28 550 | Repayment Terms: R268 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.

General

Imprint: Springer International Publishing AG
Country of origin: Switzerland
Series: T-Labs Series in Telecommunication Services
Release date: 2015
First published: 2015
Authors: Patrick Stewin
Dimensions: 235 x 155 x 10mm (L x W x T)
Format: Hardcover
Pages: 108
Edition: 2015 ed.
ISBN-13: 978-3-319-13514-4
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
Promotions
LSN: 3-319-13514-7
Barcode: 9783319135144

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R565 Discovery Miles 5 650
The Cybersecurity Mindset - A Virtual…
Dewayne Hart Hardcover R784 Discovery Miles 7 840
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,724 Discovery Miles 67 240
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R2,864 Discovery Miles 28 640

See more

Partners