Narrow your search
Listing 1 - 3 of 3
Sort by
Computer peripherals for minicomputers, microprocessors, and personal computers
Author:
ISBN: 0070294518 9780070294516 Year: 1980 Publisher: New York (N.Y.): MacGraw-Hill


Book
Peripheral Interaction : Challenges and Opportunities for HCI in the Periphery of Attention
Authors: --- ---
ISBN: 3319295217 3319295233 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computing devices have become ever more present in our everyday environments, however embedding these technologies into our routines has remained a challenge. This book explores the novel theory of peripheral interaction to rectify this. This theory examines how interactive systems can be developed in such a way to allow people to seamlessly interact with their computer devices, but only focus on them at relevant times, building on the way in which people effortlessly divide their attention over several everyday activities in day to day life. Capturing the current state of the art within the field, this book explores the history and foundational theories of peripheral interaction, discusses novel interactive styles suitable for peripheral interaction, addresses different application domains which can benefit from peripheral interaction and presents visions of how these developments can have a positive impact on our future lives. As such, this book’s aim is to contribute to research and practice in fields such as human-computer interaction, ubiquitous computing and Internet of Things, a view on how interactive technology could be redesigned to form a meaningful, yet unobtrusive part of people’s everyday lives. Peripheral Interaction will be highly beneficial to researchers and designers alike in areas such as HCI, Ergonomics and Interaction Design.


Book
Detecting Peripheral-based Attacks on the Host Memory
Author:
ISBN: 9783319135151 3319135147 9783319135144 3319135155 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.  .

Keywords

Engineering. --- Communications Engineering, Networks. --- Input/Output and Data Communications. --- Systems and Data Security. --- Data transmission systems. --- Data protection. --- Telecommunication. --- Ingénierie --- Données --- Protection de l'information (Informatique) --- Télécommunications --- Transmission --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electrical Engineering --- Rootkits (Computer software) --- Host-based intrusion detection systems (Computer security) --- Computer peripherals --- Security measures. --- Peripheral computer devices --- Peripheral computer equipment --- Peripheral devices (Computers) --- Peripheral equipment (Computers) --- Peripherals, Computer --- HIDSs (Host-based intrusion detection systems) --- Input-output equipment (Computers). --- Computer security. --- Electrical engineering. --- Computer input-output equipment --- Intrusion detection systems (Computer security) --- Malware (Computer software) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Protection --- Security measures --- Computer hardware --- Computer I/O equipment --- Electronic analog computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Electric engineering --- Engineering --- Input-output equipment

Listing 1 - 3 of 3
Sort by