Cargando…
Detecting peripheral-based attacks on the host memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2015
|
Materias: | |
Acceso en línea: | https://dx.doi.org/10.1007/978-3-319-13515-1 http://cds.cern.ch/record/1980532 |