LEADER 02739oam 2200481 450 001 9910483454203321 005 20210629160305.0 010 $a3-030-62707-1 024 7 $a10.1007/978-3-030-62707-2 035 $a(CKB)4100000011746980 035 $a(DE-He213)978-3-030-62707-2 035 $a(MiAaPQ)EBC6469864 035 $a(PPN)253861675 035 $a(EXLCZ)994100000011746980 100 $a20210629d2021 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aHardware supply chain security $ethreat modelling, emerging attacks and countermeasures /$fBasel Halak, editor 205 $a1st ed. 2021. 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (XV, 217 p. 2 illus.) 311 $a3-030-62706-3 327 $aPart I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System. 330 $aThis book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems. . 606 $aComputer security 606 $aComputer input-output equipment$xSecurity measures 606 $aComputer viruses 615 0$aComputer security. 615 0$aComputer input-output equipment$xSecurity measures. 615 0$aComputer viruses. 676 $a005.8 702 $aHalak$b Basel 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910483454203321 996 $aHardware supply chain security$92847282 997 $aUNINA