Security Engineering. Ross Anderson

Чтение книги онлайн.

Читать онлайн книгу Security Engineering - Ross Anderson страница 5

Security Engineering - Ross  Anderson

Скачать книгу

4.3: The Mafia-in-the-middle attack

      4 Chapter 5Figure 5.1: Monoalphabetic substitution cipherFigure 5.9: The random oracleFigure 5.10: A simple 16-bit SP-network block cipherFigure 5.11: The AES linear transformation, illustrated by its effect on byt...Figure 5.12: The Feistel cipher structureFigure 5.13: The DES round functionFigure 5.14: The Linux penguin, in clear and ECB encrypted (from Wikipedia, ...Figure 5.15: Cipher Block Chaining (CBC) modeFigure 5.16: Feedforward mode (hash function)

      5 Chapter 6Figure 6.5: Stack smashing attack

      6 Chapter 8Figure 8.1: The market for apartments

      7 Chapter 9Figure 9.1: typical corporate policy languageFigure 9.3: The NRL pumpFigure 9.4: Insecure composition of secure systems with feedbackFigure 9.5: The cascade problem

      8 Chapter 10Figure 10.3: A lattice of security labels

      9 Chapter 11Figure 11.3: Table lattice for a database with three attributes

      10 Chapter 12Figure 12.1: Clay envelope and its content of tokens representing 7 jars of ...Figure 12.2: Architecture of SWIFTFigure 12.3: IBM method for generating bank card PINsFigure 12.4: Card fraud in the UK from 2004 to 2018Figure 12.5: A rigid wire is inserted through a hole in the Ingenico's conce...

      11 Chapter 13Figure 13.1: A cutaway pin-tumbler lock (courtesy of Marc Weber Tobias)Figure 13.2: Key for a sidebar lockFigure 13.3: Sidebar bump key

      12 Chapter 14Figure 14.1: A prepayment electricity meter (courtesy of Schlumberger)Figure 14.2: A tachograph chartFigure 14.3: A tachograph with an interruptor controlled by the driver using...Figure 14.4: One of the new formats for US postal meters (courtesy of Symbol...

      13 Chapter 15Figure 15.1: Shared control using geometry

      14 Chapter 16Figure 16.1: Scanning electron micrograph of paper (courtesy Ingenia Technol...Figure 16.2: A wristband seal from our local swimming pool

      15 Chapter 17Figure 17.1: The prints in the McKie caseFigure 17.2: an iris with iris code (courtesy John Daugman)

      16 Chapter 18Figure 18.1: The IBM 4758 cryptoprocessor (courtesy of Steve Weingart)Figure 18.2: The 4758 partially opened showing (from top left downward) the ...Figure 18.3: Our probing stationFigure 18.4: The data bus of an ST16 smartcard prepared for probing by excav...Figure 18.5: The protective mesh of an ST16 smartcard with a FIB cross for p...Figure 18.6: SX28 microcontroller with ‘glue logic’ (courtesy of Sergei Skor...

      17 Chapter 19Figure 19.1: RF signal from a Toshiba laptop reconstructed several rooms awa...Figure 19.2: Normal textFigure 19.3: Text low-pass filteredFigure 19.4: Screen, normal textFigure 19.5: Screen, filtered textFigure 19.6: Page of normal textFigure 19.7: Page of filtered textFigure 19.8: Hz AM signalFigure 19.9: 1200 Hz AM signalFigure 19.10: Plot of the current measured during 256 single attempts to gue...

      18 Chapter 21Figure 21.2: complex firewalls for an MLS network

      19 Chapter 22Figure 22.1: GSM authentication system components

      20 Chapter 23Figure 23.1: Spreading in DSSS (courtesy of Roche and Dugelay)Figure 23.2: Unspreading in DSSS (courtesy of Roche and Dugelay)

      21 Chapter 24Figure 24.1: Cut-and-rotate scramblingFigure 24.2: Scrambled video frameFigure 24.3: Processed video frameFigure 24.4: The multiplexer generatorFigure 24.5: Binary revocation treeFigure 24.6: The Mosaic attack (courtesy Jet Photographic, www.jetphotograph...

      22 Chapter 27Figure 27.2: Hazard elimination in motor reversing circuitFigure 27.3: A threat treeFigure 27.4: The waterfall modelFigure 27.5: The spiral model

      23 Chapter 28Figure 28.1: Two infusion pumps that are apparently of the same model (photo...

      Guide

      1  Cover

      2 Table of Contents

      3  Begin Reading

      Pages

      1  iii

      2  xxxvii

      3  xxxviii

      4  xxxix

      5  xli

      6  xlii

      7  xliii

      8  xliv

      9  xlv

      10  xlvi

      11  xlvii

      12 xlviii

      13  xlix

      14  l

      15  1

      16  2

      17  3

      18  4

      19  5

Скачать книгу