Cargando…

Detecting Peripheral-based Attacks on the Host Memory

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stewin, Patrick (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edición:1st ed. 2015.
Colección:T-Labs Series in Telecommunication Services,
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Introduction
  • Technical Background, Preliminaries and Assumptions
  • Related Work
  • Study of a Stealthy, Direct Memory Access based Malicious Software
  • A Primitive for Detecting DMA Malware
  • Authentic Reporting to External Platforms
  • Conclusions and Future Work.