Backdoor

Results: 134



#Item
1Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:11:56
2

Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

Add to Reading List

Source URL: s3.eurecom.fr

Language: English - Date: 2018-08-15 14:28:54
    3

    Backdoor.MAC.Eleanor Grants Attackers Full Access to Mac Systems A. Description: The application name is EasyDoc Converter.app, and its main functionality should be to convert documents, but it does anything but that. I

    Add to Reading List

    Source URL: labs.bitdefender.com

    Language: English - Date: 2017-05-03 10:46:04
      4

      Exploring the impact of a hard drive backdoor Jonas Zaddach <> Outline

      Add to Reading List

      Source URL: s3.eurecom.fr

      Language: English - Date: 2014-07-02 18:38:46
        5

        While parents and educators are busy fighting Common Core and high stakes testing, corporate reformers are sneaking into the backdoor of our public schools in other ways. Alison McDowell, a Philadelphia parent and educat

        Add to Reading List

        Source URL: thepjsta.files.wordpress.com

        - Date: 2017-05-14 21:20:11
          6

          How to Backdoor Diffie-Hellman David Wong NCC Group, June

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-06-21 22:14:14
            7

            MORPHISEC LAB New Wave of Fileless Kovter Backdoor Trojan Attacks Via “Targeted” Macro-Based Malware Spam Campaign INTRODUCTION

            Add to Reading List

            Source URL: www.morphisec.com

            - Date: 2016-10-25 01:05:50
              8Espionage / Contract law / Backdoor / Cryptography / Rootkits / Spyware / Cyberwarfare / RSA Security / Indemnity / Security

              DOC Document

              Add to Reading List

              Source URL: backdoorbroadcasting.net

              Language: English - Date: 2016-04-06 05:48:09
              9Computing / Central processing unit / Security / Cryptography / Cyberwarfare / Backdoor / Rootkits / Spyware / Computer security / Microcode

              Modern Hardware is Complex •  Modern systems built on layers of hardware Tamper Evident Microprocessors

              Add to Reading List

              Source URL: oakland31.cs.virginia.edu

              Language: English - Date: 2010-05-25 18:37:01
              10A League of Their Own / Henry Grubstick / Only You / Television

              LIFE IN THE MOVIES MIKAL TRIMM This is the backdoor to life. You  mess   around   for   a  few  years,   sowing   the  old   wild  oats,  dreaming   the impossible dreams and then watching them

              Add to Reading List

              Source URL: www.wheatlandpress.com

              Language: English - Date: 2007-04-22 17:02:13
              UPDATE