Securing the underlying platform at the hardware and software level is the foundation of systems security – without it, any security mechanisms build at the application level to protect data, computations, or communications can be easily compromised. The two chapters in this part focus on providing the reader with an overview of current research at this systems level, in hardware (Chapter 12) and software (Chapter 13).

Generally, one is accustomed to believing that hardware itself is safe and that it is only software that has vulnerabilities. Thus, it comes as a surprise that several attacks are possible on hardware, the most insidious of which is the so-called “Trojan circuit,” a small circuit placed in the hardware during the design and manufacturing ...

Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.