Detecting Peripheral-Based Attacks on the Host Memory


Write The First Customer Review

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit.Here, stealthy malicious ...

Detecting Peripheral-Based Attacks on the Host Memory 2016, Springer

ISBN-13: 9783319386188

Softcover Reprint of the Origi edition

Trade paperback

Detecting Peripheral-based Attacks on the Host Memory 2014, Springer International Publishing AG, Cham

ISBN-13: 9783319135144