This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns.
This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting.
This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference.
Produkt-Info
Auflage
Sprache
Verlagsort
Verlagsgruppe
Illustrationen
46 s/w Abbildungen
IX, 189 p. 46 illus.
Dateigröße
Schlagworte
Ddigital fingerprintingDevice MeasurementDatenverschlüsselungDigital Fingerprinting,Forensics,Physical Device Identification,Authentication and Access Control,Security,Device Measurement,Crypto-Based Methods,Provenance Collection,Origin of Variation,Embedding,Hardware Security,Intrusion detection,Digital tokens,Origin of VariationHardware SecurityPhysical Device IdentificationDatenverarbeitungDatensicherheitKISicherheitDigital tokensSicherheit / DatensicherheitKryptografieDatensicherheit / NetzVerschlüsselungKünstliche Intelligenz - AIIntelligenz / Künstliche IntelligenzCrypto-Based MethodsDatenverarbeitung / Datenverschlüsselung, KryptografieDatenverarbeitung / DatenverschlüsselungMustererkennungProvenance CollectionBiometrieforensicsembeddingAuthentication and Access Controlintrusion detectionsecurityDatensicherungSpoofing
ISBN-13
978-1-4939-6601-1 (9781493966011)
Schweitzer Klassifikation
Thema Klassifikation
DNB DDC Sachgruppen
Dewey Decimal Classfication (DDC)
BIC 2 Klassifikation
BISAC Klassifikation
Warengruppensystematik 2.0
Ryan M. Gerdes is an assistant professor of Electrical and Computer Engineering at Virginia Polytechnic Institute. His interests include signal and data authentication, hardware and device security, computer and network security, transportation security, and applied electromagnetics.
Yong Guan is an associate professor at Iowa State University. His research and teaching are in computer networks and distributed systems, with focuses on security issues, including computer and network forensics, wireless and sensor network security, privacy-enhancing technologies for the Internet, and secure real-time computing and communication.
Sneha Kumar Kasera is a professor in the School of Computing at the University of Utah. Before joining the University of Utah, he spent four years in the Mobile Networking Research Department at Bell Labs, Lucent Technologies. Earlier, I obtained a Ph.D. in Computer Science from the Advanced Networks Research Group at the University of Massachusetts in Amherst.
Cliff Wang is the program director at US Army Research Office, managing a large portfolio of university research. He is also appointed as an adjunct professor at North Carolina State University. Dr. Wang is a fellow of IEEE.
Introduction.- Types and Origins of Fingerprints.- Device Measurement and Origin of Variation.- Crypto-based Methods and Fingerprints.- Fingerprinting by Design: Embedding and Authentication.- Digital Fingerprint: A Practical Hardware Security Primitive.- Operating System Fingerprinting.- Secure and Trustworthy Provenance Collection for Digital Forensics.- Conclusion.
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.