- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Technology
- > electronics, electrical engineering, telecommunications
Full Description
This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.
Contents
Introduction.- Information weapon: concepts, means, methods and examples of application.- Computer Viruses, Malicious Logic and Spyware.- Hardware Trojans in Electronic Devices.- Hardware Trojans in Microcircuits.- Methods of Identification of Hardware Trojans in Integrated Circuits.- Reverse Engineering of Integrated Circuits.- Methods of counteracting hardware IC Trojans.- Is the Trojan phenomenon a new stage in the evolution of modern weapons?.