LEADER 03985nam 22006135 450 001 9910407732303321 005 20211119161749.0 010 $a3-030-47218-3 024 7 $a10.1007/978-3-030-47218-4 035 $a(CKB)4100000011321171 035 $a(MiAaPQ)EBC6240746 035 $a(DE-He213)978-3-030-47218-4 035 $a(PPN)248598538 035 $a(EXLCZ)994100000011321171 100 $a20200627d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aViruses, Hardware and Software Trojans $eAttacks and Countermeasures /$fby Anatoly Belous, Vitali Saladukha 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (839 pages) 311 $a3-030-47217-5 327 $aIntroduction -- Information weapon: concepts, means, methods and examples of application -- Computer Viruses, Malicious Logic and Spyware -- Hardware Trojans in Electronic Devices -- Hardware Trojans in Microcircuits -- Methods of Identification of Hardware Trojans in Integrated Circuits -- Reverse Engineering of Integrated Circuits -- Methods of counteracting hardware IC Trojans -- Is the Trojan phenomenon a new stage in the evolution of modern weapons?. 330 $aThis book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker ? a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction. Describes the evolution of hardware Trojans from "cabinets", "boxes" and "cases" to advanced circuits; Discusses both software and hardware Trojans, the principles of their design, the mechanisms of functioning, the methods of detection, the methods of masking them, the methods of prevention and protection; Presents complex topics using simple language, minimizing mathematics. 606 $aElectronic circuits 606 $aComputer engineering 606 $aInternet of things 606 $aEmbedded computer systems 606 $aMicroprocessors 606 $aCircuits and Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/T24068 606 $aCyber-physical systems, IoT$3https://scigraph.springernature.com/ontologies/product-market-codes/T24080 606 $aProcessor Architectures$3https://scigraph.springernature.com/ontologies/product-market-codes/I13014 615 0$aElectronic circuits. 615 0$aComputer engineering. 615 0$aInternet of things. 615 0$aEmbedded computer systems. 615 0$aMicroprocessors. 615 14$aCircuits and Systems. 615 24$aCyber-physical systems, IoT. 615 24$aProcessor Architectures. 676 $a005.8 676 $a621.3815 700 $aBelous$b Anatoly$4aut$4http://id.loc.gov/vocabulary/relators/aut$0904000 702 $aSaladukha$b Vitali$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910407732303321 996 $aViruses, Hardware and Software Trojans$92020908 997 $aUNINA