Skip to main content

Conclusions and Future Work

  • Chapter
  • First Online:
Detecting Peripheral-based Attacks on the Host Memory

Part of the book series: T-Labs Series in Telecommunication Services ((TLABS))

  • 523 Accesses

Abstract

The compromise of computer platform peripherals to attack the host platform memory currently represents the peak of the rootkit evolution.

Logic is a systematic method of coming to the wrong conclusion with confidence.

Manly’s Maxim,

Murphy’s Law Collection

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick Stewin .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Stewin, P. (2015). Conclusions and Future Work. In: Detecting Peripheral-based Attacks on the Host Memory. T-Labs Series in Telecommunication Services. Springer, Cham. https://doi.org/10.1007/978-3-319-13515-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13515-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13514-4

  • Online ISBN: 978-3-319-13515-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics