Linked e-resources
Details
Table of Contents
Part I. Threat Modelling of Hardware Supply Chain
Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security
Part II. Emerging Hardware-based Security Attacks and Countermeasures
Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices
Part III. Anomaly Detection in Embedded Systems
Chapter 4. Anomalous Behaviour in Embedded Systems
Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection
Chapter 6. Anomaly Detection in an Embedded System.
Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security
Part II. Emerging Hardware-based Security Attacks and Countermeasures
Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices
Part III. Anomaly Detection in Embedded Systems
Chapter 4. Anomalous Behaviour in Embedded Systems
Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection
Chapter 6. Anomaly Detection in an Embedded System.