O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the underlying platform at the hardware and software level is the foundation of systems security – without it, any security mechanisms build at the application level to protect data, computations, or communications can be easily compromised. The two chapters in this part focus on providing the reader with an overview of current research at this systems level, in hardware (Chapter 12) and software (Chapter 13).

Generally, one is accustomed to believing that hardware itself is safe and that it is only software that has vulnerabilities. Thus, it comes as a surprise that several attacks are possible on hardware, the most insidious of which is the so-called “Trojan circuit,” a small circuit placed in the hardware during the design and manufacturing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required