The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
Preliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting...
Main Author: | |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Cham
Springer Nature
2018
Cham : 2018. |
Edition: | 1st ed. 2018. |
Series: | Simula SpringerBriefs on Computing,
4 |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009432079206719 |
Table of Contents:
- 1 Introduction
- 2 Trust
- 3 What is an ICT-System?
- 4 Development of ICT Systems
- 5 Theoretical Foundation
- 6 Reverse Engineering of Code
- 7 Static Detection of Malware
- 8 Dynamic Detection Methods
- 9 Formal Methods
- 10 Software Quality and Quality Management
- 11 Containment of Untrusted Modules
- 12 Summary and Way Forward.