The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? /

Preliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting...

Full description

Saved in:
Bibliographic Details
Main Author: Lysne, Olav (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2018.
Edition:1st ed. 2018.
Series:Simula SpringerBriefs on Computing, 4
Subjects:
Online Access:Link to Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • 1 Introduction
  • 2 Trust
  • 3 What is an ICT-System?
  • 4 Development of ICT Systems
  • 5 Theoretical Foundation
  • 6 Reverse Engineering of Code
  • 7 Static Detection of Malware
  • 8 Dynamic Detection Methods
  • 9 Formal Methods
  • 10 Software Quality and Quality Management
  • 11 Containment of Untrusted Modules
  • 12 Summary and Way Forward.