fullrecord |
[{"key": "dc.contributor.advisor", "value": "Moilanen, Panu", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Imberg, Anssi", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-06-08T13:16:28Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-06-08T13:16:28Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/50205", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Laitteistotroijalaiset (hardware Trojan, hardware Trojan horse) ovat mikropii-reihin tehtyj\u00e4 haitallisia muunnoksia, jotka voivat esimerkiksi vuotaa tietoja tai aiheuttaa laitteistokomponenttien ennenaikaisen rikkoutumisen. Huoli laitteis-totroijalaisista kasvaa koko ajan, koska mikropiirien valmistus ulkoistetaan yh\u00e4 laajemmin halvempien ty\u00f6kustannusten maihin. T\u00e4ll\u00f6in kaikkia valmistuspro-sessin vaiheita ei voida valvoa, vaan vihollismielisill\u00e4 henkil\u00f6ill\u00e4 on mahdolli-suus sijoittaa haitallisia muunnoksia mikropiireihin usealla eri tavalla ja useassa eri vaiheessa. Laitteistotroijalainen koostuu kahdesta eri osasta, laukaisimesta (trigger) ja hy\u00f6tykuormasta (payload) eli troijalaisen aiheuttamasta vaikutuk-sesta. Laukaisutapoja on monia erilaisia ja troijalainen voi my\u00f6s vaikuttaa lait-teistoon monella eri tavalla.\n\nTutkimus toteutettiin kirjallisuuskatsauksena ja sen tarkoitus on m\u00e4\u00e4ritell\u00e4 lait-teistotroijalaisen k\u00e4site suomeksi ja tehd\u00e4 ensimm\u00e4inen suomenkielinen koonti-tutkimus erilaisista laitteistotroijalaisten ominaisuuksista ja vaikutuksista. Tut-kimuksen tuloksina voidaan todeta, ett\u00e4 laitteistotroijalaisten toiminta vaihtelee hyvin paljon ja ett\u00e4 niiden aiheuttama uhka on todellinen, vaikka havaintoja niiden k\u00e4yt\u00f6st\u00e4 onkin viel\u00e4 v\u00e4h\u00e4n.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Hardware Trojans or hardware Trojan horses are malicious modifications made to microchips that can cause, for example, data leakage or hardware compo-nent\u2019s premature failure. The worry about hardware Trojans is growing all the time, because the microchips\u2019 manufacturing is being outsourced to countries with cheaper working costs. All the manufacturing processes\u2019 phases cannot be supervised, and adversaries can implement malicious modifications in many different ways and in many different phases. Hardware Trojan consists of two parts, trigger and payload, which is the effect caused by the Trojan. There are many different trigger mechanisms and the Trojan may affect the hardware in many ways.\n\nThis research was made as a literary review and its purpose is to define the concept of hardware Trojan in Finnish and also to produce the first Finnish compilation research about hardware Trojans. As the results of this research, it can be said that hardware Trojans have much variation and the threat posed by them is real, although there are still very few observations and real-life exam-ples concerning hardware Trojans.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Anssi Imberg (ankaimbe) on 2016-06-08 13:16:28.427720. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-06-08T13:16:28Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201606082976.pdf: 700653 bytes, checksum: 77c92847cab86f48d21ac8f385ba924a (MD5)\nlicense.html: 4798 bytes, checksum: 8ad7c811e138ca5a8f550e1ce9fe1f1d (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-06-08T13:16:28Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201606082976.pdf: 700653 bytes, checksum: 77c92847cab86f48d21ac8f385ba924a (MD5)\nlicense.html: 4798 bytes, checksum: 8ad7c811e138ca5a8f550e1ce9fe1f1d (MD5)\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "25", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "laitteisto", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "troijalainen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Troijan hevonen", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "mikropiiri", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "luotettavuus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Laitteistotroijalaiset, niiden ominaisuudet ja vaikutukset", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201606082976", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-06-08T13:16:29Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|