Detecting Peripheral-based Attacks on the Host Memory

Available
0
StarStarStarStarStar
0Reviews

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords...

Read more
product_type_E-book
pdf
Price
74.50 £

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords...

Read more
Follow the Author

Options

  • Formats: pdf
  • ISBN: 9783319135151
  • Publication Date: 27 Dec 2014
  • Publisher: Springer International Publishing
  • Product language: English
  • Drm Setting: DRM