000 03181nam a22005295i 4500
001 978-3-030-62707-2
003 DE-He213
005 20220801220215.0
007 cr nn 008mamaa
008 210204s2021 sz | s |||| 0|eng d
020 _a9783030627072
_9978-3-030-62707-2
024 7 _a10.1007/978-3-030-62707-2
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
245 1 0 _aHardware Supply Chain Security
_h[electronic resource] :
_bThreat Modelling, Emerging Attacks and Countermeasures /
_cedited by Basel Halak.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXV, 217 p. 2 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPart I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System.
520 _aThis book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. .
650 0 _aElectronic circuits.
_919581
650 0 _aInternet of things.
_94027
650 0 _aMicroprocessors.
_948945
650 0 _aComputer architecture.
_93513
650 1 4 _aElectronic Circuits and Systems.
_948946
650 2 4 _aInternet of Things.
_94027
650 2 4 _aProcessor Architectures.
_948947
700 1 _aHalak, Basel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_948948
710 2 _aSpringerLink (Online service)
_948949
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030627065
776 0 8 _iPrinted edition:
_z9783030627089
776 0 8 _iPrinted edition:
_z9783030627096
856 4 0 _uhttps://doi.org/10.1007/978-3-030-62707-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78319
_d78319