Malware in Hardware Infrastructure Components

نویسندگان

  • Christian Krieg
  • Edgar Weippl
چکیده

Malicious hardware is a fairly new research topic that has attracted the interest of the scientific community. Therefore, numerous approaches have been proposed in the last years to counter the threat of so-called hardware Trojans. This chapter describes malicious hardware in the context of the security of hardware infrastructure components. Network infrastructure plays a vital role in our everyday lives, since many services depend on reliable and secure connections. In the following, we briefly introduce the topic of hardware Trojans. After describing their basic components, we give some insights into how hardware Trojans can be used maliciously in infrastructure devices. Furthermore, we outline the evolution of hardware Trojans and measures to counter them.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Infrastructure for Detecting Android Malware

Malware for smartphones have sky-rocketed these last years, particularly for Android platforms. To tackle this threat, services such as Google Bouncer have intended to counter-attack. However, it has been of short duration since the malware have circumvented the service by changing their behaviors. Therefore, we propose a malware taxonomy, a survey of attack vectors to better understand the And...

متن کامل

Poster: Automatic Profiling of Evasive Mixed-Mode Malware with SEMU

Malware and malware analysis are in an arms race. While analysis tries to understand the latest malware, malware tries to evade the latest analysis techniques. Modern malicious codes can evade analysis by manipulating structures that are important to the analysis, i.e., OS and virtual machine introspection components (VMI). An advanced evasion technique is orchestrating actions between user-mod...

متن کامل

A Method for Measuring Energy Consumption in IaaS Cloud

The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy measurement methods measure the energy consumed system-wide - including the energy lost in...

متن کامل

Internet Worm and Virus Protection for Very High-Speed Networks

Abstract The security of the Internet can be improved using reconfigurable hardware. A platform has been implemented that actively scans and filters Internet traffic at multi-Gigabit/second rates using reconfigurable hardware. Modular components implemented in FPGA logic process packet headers and scan for signatures of malicious software (malware) carried in packet payloads. Additional FPGA ci...

متن کامل

On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection

There is growing interest in tools for monitoring virtualisation infrastructure and detecting malware within Virtual Machines (VMs). View comparison, or crossview validation, is a technique for detecting object hiding by malware. It involves comparing different views of system objects to find discrepancies that might indicate the use of object hiding techniques. We present Linebacker, a system ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012