Back to Results
First PageMeta Content
Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage


CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger
Add to Reading List

Document Date: 2008-04-27 09:57:39


Open Document

File Size: 295,92 KB

Share Result on Facebook

Company

IBM / To-Null-Key Attack Hardware / Facebook / Eracom / CBC / Microsoft / /

Country

United States / /

Event

Music Album Release / Bankruptcy / /

IndustryTerm

social-networking / secure devices / electricity tariff / encryption software / multilevel secure systems / prepayment electricity meters / less trusted software / trusted software / bank security modules / bank security module / real solution / payment networks / software security / online transaction / brute-force search checking keys / wrapper solution / blackboard systems / industrial-scale systems / trusted software talks / bank smartcards / sundry embedded systems / web mail usage / bank / software upgrades / brute force search / tamper-resistant hardware / bank card / software attacks / code analysis tools / less trusted device / antivirus software / /

MusicAlbum

Vista / /

OperatingSystem

Mac OS / Linux / Microsoft Windows / Microsoft Vista / /

Organization

US government / European Central Bank / /

Person

Robert Watson / Mike Bond / Leonardo Da Vinci / Piotr Zielinski / John Anderson / /

/

Position

API Attacks programmer / formal model / branch manager and the branch accountant / designer / programmer / /

PublishedMedium

the Nexus / /

Technology

Linux / API / ATM / operating system / shared memory / Operating Systems / anti-virus software / TPM chip / encryption / cryptography / CPU chip / antivirus software / same protocol / /

SocialTag