Backdoor

Results: 134



#Item
41Fabless semiconductor companies / Electronics manufacturing / Joint Test Action Group / Field-programmable gate array / Actel / Microsemi / Backdoor / Microcontroller / Application-specific integrated circuit / Electronic engineering / Electronics / Embedded systems

Breakthrough silicon scanning discovers backdoor in military chip CHES2012 Workshop, Leuven, Belgium, 9-12 September 2012 Breakthrough silicon scanning discovers backdoor in military chip

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-09-07 13:28:11
42Espionage / Rootkits / Computer security / Antivirus software / Backdoor / Computer virus / Dynamic-link library / System software / Malware / Cyberwarfare

PDF Document

Add to Reading List

Source URL: info.baesystemsdetica.com

Language: English - Date: 2015-04-24 20:24:24
43Espionage / ESET / Spam / Malware / Anti-spam techniques / Email spam / Botnet / Backdoor / ESET NOD32 / Spamming / Computing / Internet

Mumblehard targets servers running Linux and BSD

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-16 13:25:30
44Malware / Rootkits / Shellcode / Hypervisor / Hacker / Antivirus software / Backdoor / Joanna Rutkowska / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / System software / Cyberwarfare / Computer security

[Black Hat DCAn Uninvited Guest Black Hat DC 2010 Conference Proceedings An Uninvited Guest (Who Won’t Go Home)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
45Malware / Cryptography / Backdoor / Rootkits / Spyware / Password / One-time password / SecurID / Security / Cyberwarfare / Computer security

A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
46NAPLAN / Writing / Debating / Persuasive writing

Podcast transcript Going beyond your backdoor: a collaborative persuasive writing project Fiona Banjer, teacher, Park Lake State School: ‘We wanted to get teachers involved in collaborating between themselves and bet

Add to Reading List

Source URL: education.qld.gov.au

Language: English - Date: 2013-04-04 21:06:32
47Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare

Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-02-11 00:25:06
48Spyware / Malware / Cryptography / Payment systems / Backdoor / Rootkits / Payment Card Industry Data Security Standard / Dynamic-link library / Dumper / Espionage / System software / Computing

Visa Data Security Bulletin

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2010-01-14 04:54:45
49Spamming / Internet / Rootkits / Phishing / Social engineering / Backdoor / Infrastructure / Email / Computer virus / Espionage / Cybercrime / Malware

Department of Homeland Security Daily Open Source Infrastructure Report

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2015-04-08 19:14:18
50Disk encryption / Malware / Cryptographic software / Computer storage / Computer security / Rootkit / RAID / Solid-state drive / Cache / Computing / Software / System software

Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

Add to Reading List

Source URL: www.ibr.cs.tu-bs.de

Language: English - Date: 2013-09-27 11:19:12
UPDATE