Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Detecting Peripheral-based Attacks on the Host Memory

Best Price (Coupon Required):
Buy Detecting Peripheral-based Attacks on the Host Memory for $76.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $84.99 - $84.99
BEST PRICE

Single Product Purchase

$76.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$84.99 $84.99

10% OFF
This deals requires coupon
$76.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783319135144
Condition
New
Product Description

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the hosts main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the hosts main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Kooperationspraktiken zweier Ganztagsschulen im Spannungsfeld von Gemeinsamkeit und Differenz

Kooperationspraktiken zweier Ganztagsschulen im Spannungsfeld von Gemeinsamkeit und Differenz

$64.99
The Palgrave Handbook of Global Perspectives on Emotional Labor in Public Service

The Palgrave Handbook of Global Perspectives on Emotional Labor in Public Service

$129.00
Bringing Religion Into International Relations

Bringing Religion Into International Relations

$54.99
Introduction to Wind Turbine Aerodynamics

Introduction to Wind Turbine Aerodynamics

$109.00
Pro WPF with VB 2008

Pro WPF with VB 2008

$54.99
Ionosphre und drahtloser Weitverkehr

Ionosphre und drahtloser Weitverkehr

$59.99
Kompakt-Lexikon Wirtschaftsmathematik und Statistik

Kompakt-Lexikon Wirtschaftsmathematik und Statistik

$34.99
Principles of Vibration and Sound

Principles of Vibration and Sound

$54.99
Decision Making Theories and Methods Based on Interval-Valued Intuitionistic Fuzzy Sets

Decision Making Theories and Methods Based on Interval-Valued Intuitionistic Fuzzy Sets

$109.99
Fabrikstrukturen im Zeitalter des Wandels  welcher Weg fhrt zum Erfolg?

Fabrikstrukturen im Zeitalter des Wandels welcher Weg fhrt zum Erfolg?

$59.99
Migrant Integration between Homeland and Host Society Volume 2

Migrant Integration between Homeland and Host Society Volume 2

$109.99
Tools and Methods of Program Analysis

Tools and Methods of Program Analysis

$39.99
HCI and Usability for e-Inclusion

HCI and Usability for e-Inclusion

$109.99
Bug Scouts: Out in the Wild! (Hardcover)

Bug Scouts: Out in the Wild! (Hardcover)

$17.24
Grundri des sozialen Versicherungsrechts

Grundri des sozialen Versicherungsrechts

$59.99
Gut and the Liver

Gut and the Liver

$219.99
Caring for Patients Across the Cancer Care Continuum

Caring for Patients Across the Cancer Care Continuum

$54.99
Entscheidungsunterstutzung in Theorie und Praxis

Entscheidungsunterstutzung in Theorie und Praxis

$74.99
Transplantation in Hematology and Oncology II

Transplantation in Hematology and Oncology II

$129.00
Religion und Sozialkapital

Religion und Sozialkapital

$49.99
Ubiquitous Computing and Ambient Intelligence: Context-Awareness and Context-Driven Interaction

Ubiquitous Computing and Ambient Intelligence: Context-Awareness and Context-Driven Interaction

$54.99
Zahlenzauber

Zahlenzauber

$49.99
Reviews of Environmental Contamination and Toxicology

Reviews of Environmental Contamination and Toxicology

$84.99
Rules and Reasoning

Rules and Reasoning

$54.99
Smart Industry & Smart Education

Smart Industry & Smart Education

$219.99
The Legitimacy of Highest Courts Rulings

The Legitimacy of Highest Courts Rulings

$199.99
Marketing und Ethik

Marketing und Ethik

$49.99
Internet Marketing and Big Data Exploitation

Internet Marketing and Big Data Exploitation

$109.99
On Artin's Conjecture for Odd 2-dimensional Representations

On Artin's Conjecture for Odd 2-dimensional Representations

$39.99
Mechanics of Composite Materials and Structures

Mechanics of Composite Materials and Structures

$219.99
Sombras!

Sombras!

$3.71
Image Correlation for Shape, Motion and Deformation Measurements

Image Correlation for Shape, Motion and Deformation Measurements

$189.00
Anamnese - Untersuchung - Diagnostik

Anamnese - Untersuchung - Diagnostik

$44.99
Transesophageal Echocardiography

Transesophageal Echocardiography

$54.99
Dispersive Kinetics

Dispersive Kinetics

$109.99
Selection and Evaluation of Advanced Manufacturing Technologies

Selection and Evaluation of Advanced Manufacturing Technologies

$84.99
Multimedia, Telecommunications, and Applications

Multimedia, Telecommunications, and Applications

$39.99
Qualitative Analysis of Set-Valued Differential Equations

Qualitative Analysis of Set-Valued Differential Equations

$109.99
Networking Infrastructure for Pervasive Computing

Networking Infrastructure for Pervasive Computing

$129.00
News Media and EU-China Relations

News Media and EU-China Relations

$39.99
previous
next