The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? /
Preliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting...
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Edition: | 1st ed. 2018. |
Series: | Simula SpringerBriefs on Computing,
4 |
Subjects: | |
Online Access: | Link to Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- 1 Introduction
- 2 Trust
- 3 What is an ICT-System?
- 4 Development of ICT Systems
- 5 Theoretical Foundation
- 6 Reverse Engineering of Code
- 7 Static Detection of Malware
- 8 Dynamic Detection Methods
- 9 Formal Methods
- 10 Software Quality and Quality Management
- 11 Containment of Untrusted Modules
- 12 Summary and Way Forward.