The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?

Preliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting...

Full description

Bibliographic Details
Main Author: Lysne, Olav. author (author)
Format: eBook
Language:Inglés
Published: Cham Springer Nature 2018
Cham : 2018.
Edition:1st ed. 2018.
Series:Simula SpringerBriefs on Computing, 4
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009432079206719
Table of Contents:
  • 1 Introduction
  • 2 Trust
  • 3 What is an ICT-System?
  • 4 Development of ICT Systems
  • 5 Theoretical Foundation
  • 6 Reverse Engineering of Code
  • 7 Static Detection of Malware
  • 8 Dynamic Detection Methods
  • 9 Formal Methods
  • 10 Software Quality and Quality Management
  • 11 Containment of Untrusted Modules
  • 12 Summary and Way Forward.