Detecting Peripheral-based Attacks on the Host Memory
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals g...
Saved in:
| 主要作者: | |
|---|---|
| 企业作者: | |
| 格式: | 电子 电子书 |
| 语言: | English |
| 出版: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
| 版: | 1st ed. 2015. |
| 丛编: | T-Labs Series in Telecommunication Services,
|
| 主题: | |
| 在线阅读: | https://doi.org/10.1007/978-3-319-13515-1 |
| 标签: |
添加标签
没有标签, 成为第一个标记此记录!
|



