The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
Free
Description
Contents
Reviews
Language
English
ISBN
978-3-319-74950-1
Cover
Frontmatter
1. Introduction
2. Trust
3. What Is an ICT System?
4. Development of ICT Systems
5. Theoretical Foundation
6. Reverse Engineering of Code
7. Static Detection of Malware
8. Dynamic Detection Methods
9. Formal Methods
10. Software Quality and Quality Management
11. Containment of Untrusted Modules
12. Summary and Way Forward
@vikartianatra
about 3 years ago
Подход к задаче системный хотя выводы некоторые...автор не осмеливается даже на свой же вопрос дать ответ заданный.