001434698 000__ 03566cam\a2200661Mi\4500 001434698 001__ 1434698 001434698 003__ OCoLC 001434698 005__ 20230309003814.0 001434698 006__ m\\\\\o\\d\\\\\\\\ 001434698 007__ cr\un\nnnunnun 001434698 008__ 210204s2021\\\\gw\a\\\\o\\\\\000\0\eng\d 001434698 019__ $$a1236367481$$a1237403411$$a1240630152$$a1244559448 001434698 020__ $$a9783030627072 001434698 020__ $$a3030627071 001434698 020__ $$z3030627063 001434698 020__ $$z9783030627065 001434698 0247_ $$a10.1007/978-3-030-62707-2$$2doi 001434698 035__ $$aSP(OCoLC)1241066747 001434698 040__ $$aDKU$$beng$$epn$$cDKU$$dOCLCO$$dOCLCQ$$dYDX$$dSFB$$dYDXIT$$dEBLCP$$dGW5XE$$dUAB$$dOCLCF$$dOCLCO$$dOCLCQ 001434698 049__ $$aISEA 001434698 050_4 $$aTK7888.4 001434698 08204 $$a621.3815$$223 001434698 24500 $$aHardware Supply Chain Security :$$bThreat Modelling, Emerging Attacks and Countermeasures /$$cedited by Basel Halak. 001434698 250__ $$a1st ed. 2021. 001434698 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint :$$bSpringer,$$c2021. 001434698 300__ $$a1 online resource (XV, 217 pages 2 illustrations) 001434698 336__ $$atext$$btxt$$2rdacontent 001434698 337__ $$acomputer$$bc$$2rdamedia 001434698 338__ $$aonline resource$$bcr$$2rdacarrier 001434698 347__ $$atext file 001434698 347__ $$bPDF 001434698 5050_ $$aPart I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System. 001434698 506__ $$aAccess limited to authorized users. 001434698 520__ $$aThis book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. 001434698 650_0 $$aElectronic circuits. 001434698 650_0 $$aComputer engineering. 001434698 650_0 $$aInternet of things. 001434698 650_0 $$aEmbedded computer systems. 001434698 650_0 $$aComputer software. 001434698 650_0 $$aMicroprocessors. 001434698 650_0 $$aComputer organization. 001434698 650_0 $$aComputer programs. 001434698 650_6 $$aCircuits électroniques. 001434698 650_6 $$aOrdinateurs$$xConception et construction. 001434698 650_6 $$aInternet des objets. 001434698 650_6 $$aSystèmes enfouis (Informatique) 001434698 650_6 $$aLogiciels. 001434698 655_0 $$aElectronic books. 001434698 7001_ $$aHalak, Basel.,$$eeditor$$4edt$$4http://id.loc.gov/vocabulary/relators/edt 001434698 77608 $$iPrint version: $$z9783030627065 001434698 77608 $$iPrint version: $$z9783030627089 001434698 77608 $$iPrint version: $$z9783030627096 001434698 852__ $$bebk 001434698 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-62707-2$$zOnline Access$$91397441.1 001434698 909CO $$ooai:library.usi.edu:1434698$$pGLOBAL_SET 001434698 980__ $$aBIB 001434698 980__ $$aEBOOK 001434698 982__ $$aEbook 001434698 983__ $$aOnline 001434698 994__ $$a92$$bISE