Backdoor

Results: 134



#Item
1Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:11:56
2Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

Add to Reading List

Source URL: s3.eurecom.fr

Language: English - Date: 2018-08-15 14:28:54
    3Backdoor.MAC.Eleanor Grants Attackers Full Access to Mac Systems A. Description: The application name is EasyDoc Converter.app, and its main functionality should be to convert documents, but it does anything but that.  I

    Backdoor.MAC.Eleanor Grants Attackers Full Access to Mac Systems A. Description: The application name is EasyDoc Converter.app, and its main functionality should be to convert documents, but it does anything but that. I

    Add to Reading List

    Source URL: labs.bitdefender.com

    Language: English - Date: 2017-05-03 10:46:04
      4Exploring the impact of a hard drive backdoor Jonas Zaddach <>  Outline

      Exploring the impact of a hard drive backdoor Jonas Zaddach <> Outline

      Add to Reading List

      Source URL: s3.eurecom.fr

      Language: English - Date: 2014-07-02 18:38:46
        5While parents and educators are busy fighting Common Core and high stakes testing, corporate reformers are sneaking into the backdoor of our public schools in other ways. Alison McDowell, a Philadelphia parent and educat

        While parents and educators are busy fighting Common Core and high stakes testing, corporate reformers are sneaking into the backdoor of our public schools in other ways. Alison McDowell, a Philadelphia parent and educat

        Add to Reading List

        Source URL: thepjsta.files.wordpress.com

        - Date: 2017-05-14 21:20:11
          6How to Backdoor Diffie-Hellman David Wong NCC Group, June

          How to Backdoor Diffie-Hellman David Wong NCC Group, June

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-06-21 22:14:14
            7MORPHISEC LAB  New Wave of Fileless Kovter Backdoor Trojan Attacks Via “Targeted” Macro-Based Malware Spam Campaign INTRODUCTION

            MORPHISEC LAB New Wave of Fileless Kovter Backdoor Trojan Attacks Via “Targeted” Macro-Based Malware Spam Campaign INTRODUCTION

            Add to Reading List

            Source URL: www.morphisec.com

            - Date: 2016-10-25 01:05:50
              8Espionage / Contract law / Backdoor / Cryptography / Rootkits / Spyware / Cyberwarfare / RSA Security / Indemnity / Security

              DOC Document

              Add to Reading List

              Source URL: backdoorbroadcasting.net

              Language: English - Date: 2016-04-06 05:48:09
              9Modern Hardware is Complex •  Modern systems built on layers of hardware  Tamper Evident Microprocessors

              Modern Hardware is Complex •  Modern systems built on layers of hardware Tamper Evident Microprocessors

              Add to Reading List

              Source URL: oakland31.cs.virginia.edu

              Language: English - Date: 2010-05-25 18:37:01
              10LIFE IN THE MOVIES MIKAL TRIMM This is the backdoor to life. You  mess   around   for   a  few  years,   sowing   the  old   wild  oats,  dreaming   the impossible dreams and then watching them

              LIFE IN THE MOVIES MIKAL TRIMM This is the backdoor to life. You  mess   around   for   a  few  years,   sowing   the  old   wild  oats,  dreaming   the impossible dreams and then watching them

              Add to Reading List

              Source URL: www.wheatlandpress.com

              Language: English - Date: 2007-04-22 17:02:13