Loading…

Detecting Peripheral-based Attacks on the Host Memory

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Stewin, Patrick (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:Inglés
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edition:1st ed. 2015.
Series:T-Labs Series in Telecommunication Services,
Subjects:
Online Access:Texto Completo