Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses, Vemuri Ranga, Chen Suyuan


Варианты приобретения
Цена: 79190.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 171 шт.  
При оформлении заказа до: 2025-08-18
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Vemuri Ranga, Chen Suyuan
Название:  Split Manufacturing of Integrated Circuits for Hardware Security and Trust: Methods, Attacks and Defenses
ISBN: 9783030734442
Издательство: Springer
Классификация:

ISBN-10: 3030734447
Обложка/Формат: Hardcover
Страницы: 193
Вес: 0.49 кг.
Дата издания: 15.06.2021
Язык: English
Размер: 23.50 x 15.49 x 1.42 cm
Ссылка на Издательство: Link
Поставляется из: Германии
Описание:

Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits.

Split manufacturing refers to the process of splitting an IC design into multiple parts and fabricating these parts at two or more foundries such that the design is secure even when some or all of those foundries are potentially untrusted. Realizing its security benefits, researchers have proposed split fabrication methods for 2D, 2.5D, and the emerging 3D ICs. Both attack methods against split designs and defense techniques to thwart those attacks while minimizing overheads have steadily progressed over the past decade.

This book presents a comprehensive review of the state-of-the-art and emerging directions in design splitting for secure split fabrication, design recognition and recovery attacks against split designs, and design techniques to defend against those attacks. Readers will learn methodologies for secure and trusted IC design and fabrication using split design methods to protect against supply chain vulnerabilities.




The Continuing Arms Race: Code-Reuse Attacks and Defenses

Автор: Per Larsen, Ahmad-Reza Sadeghi
Название: The Continuing Arms Race: Code-Reuse Attacks and Defenses
ISBN: 1970001836 ISBN-13(EAN): 9781970001839
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 85570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Research in Attacks, Intrusions and Defenses

Автор: Angelos Stavrou; Herbert Bos; Georgios Portokalidi
Название: Research in Attacks, Intrusions and Defenses
ISBN: 331911378X ISBN-13(EAN): 9783319113784
Издательство: Springer
Рейтинг:
Цена: 67080.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Computer security.- Network security.- Authentication.- Malware.- Intrusion detection.- Browser security.- Web application security.- Wireless security.- Vulnerability analysis.

Research in Attacks, Intrusions, and Defenses

Автор: Michael Bailey; Thorsten Holz; Manolis Stamatogian
Название: Research in Attacks, Intrusions, and Defenses
ISBN: 3030004694 ISBN-13(EAN): 9783030004699
Издательство: Springer
Рейтинг:
Цена: 79190.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.

Building Secure Defenses Against Code-Reuse Attacks

Автор: Lucas Davi; Ahmad-Reza Sadeghi
Название: Building Secure Defenses Against Code-Reuse Attacks
ISBN: 3319255444 ISBN-13(EAN): 9783319255446
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field.

Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment

Автор: Sklavos Nicolas, Chaves Ricardo, Di Natale Giorgio
Название: Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
ISBN: 3319830376 ISBN-13(EAN): 9783319830377
Издательство: Springer
Рейтинг:
Цена: 83850.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools.

Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures

Автор: Halak Basel
Название: Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures
ISBN: 3030627063 ISBN-13(EAN): 9783030627065
Издательство: Springer
Цена: 111790.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system.

Hardware IP Security and Trust

Автор: Mishra Prabhat, Bhunia Swarup, Tehranipoor Mark
Название: Hardware IP Security and Trust
ISBN: 3319840703 ISBN-13(EAN): 9783319840703
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.

The Continuing Arms Race: Code-Reuse Attacks and Defenses

Автор: Larsen Per, Sadeghi Ahmad-Reza
Название: The Continuing Arms Race: Code-Reuse Attacks and Defenses
ISBN: 1970001801 ISBN-13(EAN): 9781970001808
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 69010.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Protective Security: Creating Military-Grade Defenses for Your Digital Business

Автор: Seaman Jim
Название: Protective Security: Creating Military-Grade Defenses for Your Digital Business
ISBN: 1484269071 ISBN-13(EAN): 9781484269077
Издательство: Springer
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Chapter 1: What is Protective Security (PS)?

An introduction to the term 'Protective Security' and a description of why this differs to other industry terms (e.g. Cyber Security, Information Security, IT Security, Network Security, etc.)?

Why PS should be an integral for your business operations?

Chapter 2: Protective Security (PS) in terms of the Legal & Regulatory Perspective.

A deep dive into the Legal and Regulatory perspectives and how an effective PS strategy can help fulfil these ever-changing requirements?

PS and the European Union General Data Protection Act (EU-GDPR).

Chapter 3: The integration of Compliance with Protective Security (PS).

A description of where compliance fits into a company-wide PS strategy.

PS and the Payment Card Industry Data Security Standard (PCI DSS).

Chapter 4: The Development of an Effective Protective Security (PS) Strategy.

A comprehensive guide to the development of an effective strategy, aligning business assets to their importance for the business objectives and goals, to incorporate the threats, risks, and core components of any strategy.

Strategic alignment with the business context.

Chapter 5: Cyber Security.

A deep dive into the concept of Cyber Security, with a focus on Point of Origins (PoO) that occur in the 'Badlands' (e.g. outside the corporate network) to compromise internet-facing technologies (e.g. Ecommerce, Digital, Mobile, etc.)

Securing your Digital Footprint.

Chapter 6: Network/IT Security.

The importance of secure by design/default networks to help safeguard your most important business IT assets from compromise.

Lateral Movement Attacks.

Chapter 7: Information Systems Security.

Providing a guide to the securing of these systems, as a separate asset type, based upon the value of the data assets to the business and to aid the application of the 5 Ds of Security (Defend, Detect, Delay, Disrupt & Deter).

Building Effective 5 Ds Network Architectures.

Chapter 8: Physical Security.

A comprehensive guide to the development of appropriate physical security measures and its importance within the Protective Security strategy.

Fortifying Your Business Operations.

Chapter 9: Industrial Systems Security

Increasingly, Manufacturing systems are vulnerable to cyber-attacks. Gain an insight how securing these environments can be balanced with a minimal impact on productivity.

Manufacturing Secure Operations.

Chapter 10: Securing Your Supply Chain

Gain an appreciation for securing your Supply Chains and the measures needed to ensure that the Supply Chain risks are minimized.

The Weakest Link?

Chapter 11: Developing Your Internal Firewall.

A focus on the development of a robust Security Culture, through the proactive engagement with a business' personnel assets.

Security Is Not A Dirty Word.

Chapter 12: Strict Access Restrictions

The 'Need To Know'/'Need To Access' are the fundamental principles for any effective Protective Security strategy. Gain an insight into why this is the case and how to ensure that this is the case within your organization.

The Keys To Your Empire.

Chapter 13: Building Resilient Systems

Gain an appreciation for the business value of building resilient systems and an understanding on what is required to develop resilience into your PS strategy.

The Ability To 'Bounce Back'.


An ACT to Improve Maritime and Cargo Security Through Enhanced Layered Defenses, and for Other Purposes. - Scholar`s Choice Edition

Название: An ACT to Improve Maritime and Cargo Security Through Enhanced Layered Defenses, and for Other Purposes. - Scholar`s Choice Edition
ISBN: 1296016358 ISBN-13(EAN): 9781296016357
Издательство: Неизвестно
Рейтинг:
Цена: 22990.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.

This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.

As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.


Ballistic Missile Defenses and U.S. National Security

Название: Ballistic Missile Defenses and U.S. National Security
ISBN: 1288981821 ISBN-13(EAN): 9781288981823
Издательство: Неизвестно
Цена: 33050.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Security of Flood Defenses

Автор: Jos de Lange
Название: Security of Flood Defenses
ISBN: 3110620618 ISBN-13(EAN): 9783110620610
Издательство: Walter de Gruyter
Цена: 148700.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The series on Integrated Security Science is aimed at publishing innovative scholarly manuscripts that make a significant contribution – theoretically or empirically – to all areas of integrated security. Of particular interest are articles that combine science, technology, and regulations to invent sophisticated yet practical solutions for securing hazardous materials (preventing from either intentional release of hazardous materials or theft of hazardous materials) in various domains including: chemical plants, power plants (nuclear, LNG, etc.), oil and gas refineries, pipelines, transportation of hazardous materials, drinking water systems. To limit the scope of the journal, the following areas are excluded: computer and information security if not integrated into physical security; law security from a purely psychological perspective; and international security (e.g., conflicts, wars, etc.). The scope of the series includes, but is not limited to: ? Analysis of security challenges in major hazardous installations ? Innovative probabilistic and deterministic approaches to threat assessment ? Vulnerability assessment of major hazardous installations under intentional events ? Consequence analysis of intentional events with an emphasis on cascading effects ? Security-based decision making and design ? Optimization of counter-terrorism measures ? Economic assessment of integrated security


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия