Cargando…
Detecting peripheral-based attacks on the host memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
Autor principal: | Stewin, Patrick |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2015
|
Materias: | |
Acceso en línea: | https://dx.doi.org/10.1007/978-3-319-13515-1 http://cds.cern.ch/record/1980532 |
Ejemplares similares
-
Seven Deadliest Unified Communications Attacks
por: York, Dan
Publicado: (2010) -
Public Key Cryptography: applications and attacks
por: Batten, L.
Publicado: (2013) -
Understanding network hacks: attack and defense with Python
por: Ballmann, Bastian
Publicado: (2015) -
Why cryptography should not rely on physical attack complexity
por: Krämer, Juliane
Publicado: (2015) -
Unified communications forensics: anatomy of common UC attacks
por: Grant, Nicholas Mr, et al.
Publicado: (2013)