Читать книгу Security Engineering - Ross Anderson - Страница 3

List of Illustrations

Оглавление

1 Chapter 1Figure 1.1: – Security Engineering Analysis Framework

2 Chapter 2Figure 2.1: Muscular – the slide

3 Chapter 4Figure 4.1: Password generator useFigure 4.2: The MIG-in-the middle attackFigure 4.3: The Mafia-in-the-middle attack

4 Chapter 5Figure 5.1: Monoalphabetic substitution cipherFigure 5.9: The random oracleFigure 5.10: A simple 16-bit SP-network block cipherFigure 5.11: The AES linear transformation, illustrated by its effect on byt...Figure 5.12: The Feistel cipher structureFigure 5.13: The DES round functionFigure 5.14: The Linux penguin, in clear and ECB encrypted (from Wikipedia, ...Figure 5.15: Cipher Block Chaining (CBC) modeFigure 5.16: Feedforward mode (hash function)

5 Chapter 6Figure 6.5: Stack smashing attack

6 Chapter 8Figure 8.1: The market for apartments

7 Chapter 9Figure 9.1: typical corporate policy languageFigure 9.3: The NRL pumpFigure 9.4: Insecure composition of secure systems with feedbackFigure 9.5: The cascade problem

8 Chapter 10Figure 10.3: A lattice of security labels

9 Chapter 11Figure 11.3: Table lattice for a database with three attributes

10 Chapter 12Figure 12.1: Clay envelope and its content of tokens representing 7 jars of ...Figure 12.2: Architecture of SWIFTFigure 12.3: IBM method for generating bank card PINsFigure 12.4: Card fraud in the UK from 2004 to 2018Figure 12.5: A rigid wire is inserted through a hole in the Ingenico's conce...

11 Chapter 13Figure 13.1: A cutaway pin-tumbler lock (courtesy of Marc Weber Tobias)Figure 13.2: Key for a sidebar lockFigure 13.3: Sidebar bump key

12 Chapter 14Figure 14.1: A prepayment electricity meter (courtesy of Schlumberger)Figure 14.2: A tachograph chartFigure 14.3: A tachograph with an interruptor controlled by the driver using...Figure 14.4: One of the new formats for US postal meters (courtesy of Symbol...

13 Chapter 15Figure 15.1: Shared control using geometry

14 Chapter 16Figure 16.1: Scanning electron micrograph of paper (courtesy Ingenia Technol...Figure 16.2: A wristband seal from our local swimming pool

15 Chapter 17Figure 17.1: The prints in the McKie caseFigure 17.2: an iris with iris code (courtesy John Daugman)

16 Chapter 18Figure 18.1: The IBM 4758 cryptoprocessor (courtesy of Steve Weingart)Figure 18.2: The 4758 partially opened showing (from top left downward) the ...Figure 18.3: Our probing stationFigure 18.4: The data bus of an ST16 smartcard prepared for probing by excav...Figure 18.5: The protective mesh of an ST16 smartcard with a FIB cross for p...Figure 18.6: SX28 microcontroller with ‘glue logic’ (courtesy of Sergei Skor...

17 Chapter 19Figure 19.1: RF signal from a Toshiba laptop reconstructed several rooms awa...Figure 19.2: Normal textFigure 19.3: Text low-pass filteredFigure 19.4: Screen, normal textFigure 19.5: Screen, filtered textFigure 19.6: Page of normal textFigure 19.7: Page of filtered textFigure 19.8: Hz AM signalFigure 19.9: 1200 Hz AM signalFigure 19.10: Plot of the current measured during 256 single attempts to gue...

18 Chapter 21Figure 21.2: complex firewalls for an MLS network

19 Chapter 22Figure 22.1: GSM authentication system components

20 Chapter 23Figure 23.1: Spreading in DSSS (courtesy of Roche and Dugelay)Figure 23.2: Unspreading in DSSS (courtesy of Roche and Dugelay)

21 Chapter 24Figure 24.1: Cut-and-rotate scramblingFigure 24.2: Scrambled video frameFigure 24.3: Processed video frameFigure 24.4: The multiplexer generatorFigure 24.5: Binary revocation treeFigure 24.6: The Mosaic attack (courtesy Jet Photographic, www.jetphotograph...

22 Chapter 27Figure 27.2: Hazard elimination in motor reversing circuitFigure 27.3: A threat treeFigure 27.4: The waterfall modelFigure 27.5: The spiral model

23 Chapter 28Figure 28.1: Two infusion pumps that are apparently of the same model (photo...

Security Engineering

Подняться наверх