skip to content
Hardware malware Preview this item
ClosePreview this item
Checking...

Hardware malware

Author: Christian Krieg; Adrian Dabrowski; Heidelinde Hobel; Katharina Krombholz; Edgar R Weippl
Publisher: [San Rafael, California] : Morgan & Claypool Publishers, [2013]
Series: Synthesis lectures on information security, privacy and trust, #6.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Christian Krieg; Adrian Dabrowski; Heidelinde Hobel; Katharina Krombholz; Edgar R Weippl
ISBN: 9781627052528 1627052526 1627052518 9781627052511
OCLC Number: 860909294
Description: 1 online resource (xi, 103 pages) : illustrations.
Contents: 1. Introduction --
1.1 Motivation --
1.2 Background --
1.3 Production process of hardware systems --
1.3.1 Workflow --
1.3.2 Vulnerabilities. 2. Hardware Trojans --
2.1 Components --
2.1.1 Triggers --
2.1.2 Payload --
2.1.3 Interfaces --
2.2 Types --
2.3 Attack parameters --
2.3.1 Level of abstraction --
2.3.2 Technology domain --
2.3.3 Target technology --
2.3.4 Injection phase --
2.3.5 Attackers --
2.3.6 Topology --
2.4 Metrics --
2.4.1 Structural complexity --
2.4.2 Impacts --
2.4.3 Attack probability --
2.4.4 Activation probability --
2.4.5 Implementation costs --
2.4.6 Detection costs. 3. Countermeasures --
3.1 Introduction and challenges --
3.2 Detection --
3.2.1 Formal verification --
3.2.2 Simulation --
3.2.3 Logic testing --
3.2.4 Side-channel analysis --
3.2.5 Invasion --
3.3 Localization --
3.3.1 Activation --
3.3.2 Mensuration --
3.3.3 Calculation --
3.4 Prevention --
3.4.1 Obfuscation --
3.4.2 Invasion --
3.5 Circumventing Trojan countermeasures. 4. Historical overview --
4.1 Hardware Trojans: the beginnings (2005-2008) --
4.2 Hardware Trojans: a flood of research (2009-2010) --
4.3 A reflection on current approaches (2011-2012). 5. Hot topics and conclusions --
5.1 Hot topics in hardware security and trust --
5.2 Conclusions. Glossary --
Bibliography --
Authors' biographies.
Series Title: Synthesis lectures on information security, privacy and trust, #6.
Responsibility: Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl.

Abstract:

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/860909294> # Hardware malware
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
   library:oclcnum "860909294" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/hardware_security> ; # hardware security
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/formal_verification> ; # formal verification
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/attacker_taxonomy> ; # attacker taxonomy
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Topic/malware_computer_software> ; # Malware (Computer software)
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/attack_taxonomy> ; # attack taxonomy
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Topic/integrated_circuits_design_and_construction_quality_control> ; # Integrated circuits--Design and construction--Quality control
   schema:about <http://id.worldcat.org/fast/975553> ; # Integrated circuits--Design and construction--Quality control
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/counter_measures_taxonomy> ; # counter-measures taxonomy
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/side_channel_analysis> ; # side-channel analysis
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/hardware_trojan_taxonomy> ; # hardware Trojan taxonomy
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/logic_testing> ; # logic testing
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Thing/hardware_trojan> ; # hardware Trojan
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Topic/computers_security_cryptography> ; # COMPUTERS--Security--Cryptography
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://id.worldcat.org/fast/1763297> ; # Hardware Trojans (Computers)
   schema:about <http://experiment.worldcat.org/entity/work/data/1779352558#Topic/computer_security> ; # Computer security
   schema:author <http://viaf.org/viaf/305451388> ; # Heidelinde Hobel
   schema:author <http://experiment.worldcat.org/entity/work/data/1779352558#Person/krieg_christian> ; # Christian Krieg
   schema:author <http://viaf.org/viaf/305379718> ; # Adrian Dabrowski
   schema:author <http://viaf.org/viaf/305451379> ; # Katharina Krombholz
   schema:author <http://experiment.worldcat.org/entity/work/data/1779352558#Person/weippl_edgar_r> ; # Edgar R. Weippl
   schema:bookFormat schema:EBook ;
   schema:datePublished "2013" ;
   schema:description "In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field."@en ;
   schema:description "1. Introduction -- 1.1 Motivation -- 1.2 Background -- 1.3 Production process of hardware systems -- 1.3.1 Workflow -- 1.3.2 Vulnerabilities."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1779352558> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://worldcat.org/issn/1945-9742> ; # Synthesis lectures on information security, privacy and trust ;
   schema:isPartOf <http://worldcat.org/issn/1945-9750> ; # Synthesis lectures on information security, privacy, & trust,
   schema:name "Hardware malware"@en ;
   schema:productID "860909294" ;
   schema:url <http://librarytitles.ebrary.com/id/10775370> ;
   schema:url <http://proquest.safaribooksonline.com/?fpi=9781627052511> ;
   schema:url <http://swb.eblib.com/patron/FullRecord.aspx?p=1441171> ;
   schema:url <http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6813206> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=646834> ;
   schema:url <http://dx.doi.org/10.2200/S00530ED1V01Y201308SPT006> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1441171> ;
   schema:workExample <http://worldcat.org/isbn/9781627052528> ;
   schema:workExample <http://worldcat.org/isbn/9781627052511> ;
   schema:workExample <http://dx.doi.org/10.2200/S00530ED1V01Y201308SPT006> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/860909294> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1779352558#Person/krieg_christian> # Christian Krieg
    a schema:Person ;
   schema:familyName "Krieg" ;
   schema:givenName "Christian" ;
   schema:name "Christian Krieg" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Person/weippl_edgar_r> # Edgar R. Weippl
    a schema:Person ;
   schema:familyName "Weippl" ;
   schema:givenName "Edgar R." ;
   schema:name "Edgar R. Weippl" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Thing/attacker_taxonomy> # attacker taxonomy
    a schema:Thing ;
   schema:name "attacker taxonomy" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Thing/counter_measures_taxonomy> # counter-measures taxonomy
    a schema:Thing ;
   schema:name "counter-measures taxonomy" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Thing/formal_verification> # formal verification
    a schema:Thing ;
   schema:name "formal verification" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Thing/hardware_security> # hardware security
    a schema:Thing ;
   schema:name "hardware security" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Thing/hardware_trojan_taxonomy> # hardware Trojan taxonomy
    a schema:Thing ;
   schema:name "hardware Trojan taxonomy" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Thing/side_channel_analysis> # side-channel analysis
    a schema:Thing ;
   schema:name "side-channel analysis" ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Topic/computers_security_cryptography> # COMPUTERS--Security--Cryptography
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--Cryptography"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Topic/integrated_circuits_design_and_construction_quality_control> # Integrated circuits--Design and construction--Quality control
    a schema:Intangible ;
   schema:hasPart <http://id.loc.gov/authorities/subjects/sh85067118> ;
   schema:name "Integrated circuits--Design and construction--Quality control"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1779352558#Topic/malware_computer_software> # Malware (Computer software)
    a schema:Intangible ;
   schema:name "Malware (Computer software)"@en ;
    .

<http://id.worldcat.org/fast/1763297> # Hardware Trojans (Computers)
    a schema:Intangible ;
   schema:name "Hardware Trojans (Computers)"@en ;
    .

<http://id.worldcat.org/fast/975553> # Integrated circuits--Design and construction--Quality control
    a schema:Intangible ;
   schema:name "Integrated circuits--Design and construction--Quality control"@en ;
    .

<http://viaf.org/viaf/305379718> # Adrian Dabrowski
    a schema:Person ;
   schema:familyName "Dabrowski" ;
   schema:givenName "Adrian" ;
   schema:name "Adrian Dabrowski" ;
    .

<http://viaf.org/viaf/305451379> # Katharina Krombholz
    a schema:Person ;
   schema:familyName "Krombholz" ;
   schema:givenName "Katharina" ;
   schema:name "Katharina Krombholz" ;
    .

<http://viaf.org/viaf/305451388> # Heidelinde Hobel
    a schema:Person ;
   schema:familyName "Hobel" ;
   schema:givenName "Heidelinde" ;
   schema:name "Heidelinde Hobel" ;
    .

<http://worldcat.org/isbn/9781627052511>
    a schema:ProductModel ;
   schema:isbn "1627052518" ;
   schema:isbn "9781627052511" ;
    .

<http://worldcat.org/isbn/9781627052528>
    a schema:ProductModel ;
   schema:isbn "1627052526" ;
   schema:isbn "9781627052528" ;
    .

<http://worldcat.org/issn/1945-9742> # Synthesis lectures on information security, privacy and trust ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/860909294> ; # Hardware malware
   schema:issn "1945-9742" ;
   schema:name "Synthesis lectures on information security, privacy and trust ;" ;
    .

<http://worldcat.org/issn/1945-9750> # Synthesis lectures on information security, privacy, & trust,
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/860909294> ; # Hardware malware
   schema:issn "1945-9750" ;
   schema:name "Synthesis lectures on information security, privacy, & trust," ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.