Detecting Peripheral-based Attacks on the Host Memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Collectivité auteur: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Édition: | 1st ed. 2015. |
Collection: | T-Labs Series in Telecommunication Services,
|
Sujets: | |
Accès en ligne: | Texto Completo |