Home Page Icon
Home Page
Table of Contents for
Cover Page
Close
Cover Page
by Roger R. Dube
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Cover Page
Title Page
Copyright
Dedication
ACKNOWLEDGMENTS
ABOUT THE AUTHOR
CONTENTS
PREFACE
INTRODUCTION
CHAPTER 1: THE ELEMENTS OF COMPUTER SECURITY
CRYPTOGRAPHY
PASSWORDS AND KEYS
RANDOM-NUMBER GENERATORS
SECURITY AND THE INTERNET
REFERENCES
CHAPTER 2: CRYPTOGRAPHY APPROACHES AND ATTACKS
SYMMETRIC KEY CRYPTOGRAPHY
REFERENCES
CHAPTER 3: KEY GENERATION AND DISTRIBUTION APPROACHES AND ATTACKS
KEY GENERATION
KEY DISTRIBUTION
REFERENCES
CHAPTER 4: THE QUALITIES OF WORKABLE SECURITY SOLUTIONS
SECURE COPROCESSORS
SECURE BOOTSTRAP LOADING
SECURE MEMORY MANAGEMENT
TRUSTED PLATFORM MODULE
LAGRANDE (TRUSTED EXECUTION TECHNOLOGY)
FIELD-PROGRAMMABLE GATE ARRAY
HARDWARE-BASED AUTHENTICATION
REFERENCES
CHAPTER 5: SECURE COPROCESSORS
THE NEED FOR SECURE COPROCESSORS
PHYSICAL SECURITY
INITIALIZATION
USABILITY, ACCESSIBILITY, AND SECURITY
SUPPORT AND UPGRADES
ANTICIPATORY DESIGN
AUTHENTICATION
REFERENCES
CHAPTER 6: SECURE BOOTSTRAP LOADING
THE NEED FOR SECURE BOOTSTRAP LOADING
IMPLEMENTATION
HARDWARE, FIRMWARE, AND SOFTWARE
THE TRUSTED COMPUTING BASE
CONCLUDING REMARKS
REFERENCES
CHAPTER 7: SECURE MEMORY MANAGEMENT AND TRUSTED EXECUTION TECHNOLOGY
THE NEED FOR SECURE MEMORY MANAGEMENT
BUFFER OVERFLOWS
MEMORY POINTER ATTACKS
THE IMPACT OF MEMORY-MANAGEMENT ATTACKS
MINIMIZING MEMORY-MANAGEMENT ATTACKS
PLATFORM-DESIGN CONSIDERATIONS
TRUSTED EXECUTION TECHNOLOGY
CHAPTER 8: THE TRUSTED PLATFORM MODULE
THE NEED FOR INCREASED NETWORK AND PC SECURITY
TRUST
THE NEED FOR A TRUSTED PLATFORM MODULE
THE CONCEPT OF TRUSTED COMPUTING
THE TRUSTED PLATFORM MODULE
REFERENCES
CHAPTER 9: FIELD-PROGRAMMABLE GATE ARRAYS
BACKGROUND
WHY USE AN FPGA?
SECURITY CONSIDERATIONS
ATTACK VECTORS
PREVENTING ATTACKS
REFERENCES
CHAPTER 10: HARDWARE-BASED AUTHENTICATION
WHO IS AT THE OTHER END?
AUTHENTICATION OF A PERSON
COMMON BIOMETRIC TECHNOLOGIES
AUTHENTICATION OF A DEVICE
AUTHENTICATION OF THE SURROUNDING ENVIRONMENT
REFERENCES
CHAPTER 11: A CLOSER LOOK AT BIOMETRICS
FINGERPRINT SCANNERS
THE BASICS OF FINGERPRINT ANALYSIS
IRIS SCANS
ILLUMINATION
RETINAL SCANS
REFERENCES
CHAPTER 12: TOKENS: SOMETHING YOU HAVE
OVERVIEW
RADIO-FREQUENCY IDS
SMART CARDS
INTERACTIVE TOKENS
REFERENCES
CHAPTER 13: LOCATION TECHNOLOGIES
OVERVIEW
LOCATION'S PLACE IN SECURITY
GEOLOCATION
GEOLOCATION ATTACK VECTORS
WI-FI HOT-SPOT TRIANGULATION
TIME OF FLIGHT
SHORT-RANGE BEACONS
RF POWER SPECTRUM
RF SIGNATURES
IP ADDRESS AND CLOCK SKEW
REFERENCES
CHAPTER 14: PUTTING IT ALL TOGETHER
OVERVIEW
THE CHECKLIST
COMMON ELEMENTS
SPECIFIC ELEMENTS
TWO EXAMPLES OF SECURE IMPLEMENTATIONS
CONCLUDING REMARKS
Glossary
INDEX
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset