Detecting Peripheral-based Attacks on the Host Memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
        Guardat en:
      
    
                  | Autor principal: | |
|---|---|
| Autor corporatiu: | |
| Format: | Electrònic eBook | 
| Idioma: | English | 
| Publicat: | 
      Cham :
        Springer International Publishing : Imprint: Springer,
    
      2015.
     | 
| Edició: | 1st ed. 2015. | 
| Periòdiques: | T-Labs Series in Telecommunication Services,
             | 
| Matèries: | |
| Accés en línia: | https://doi.org/10.1007/978-3-319-13515-1 | 
| Etiquetes: | 
       Afegir etiqueta    
     
      Sense etiquetes, Sigues el primer a etiquetar aquest registre!
    | 



