<--- Back to Details
First PageDocument Content
Rootkits / Malware / Programming language implementation / Compiler construction / Backdoor / Spyware / Decompiler / Compiler / Stuxnet / Software / Computing / Computer programming
Date: 2013-11-08 10:28:07
Rootkits
Malware
Programming language implementation
Compiler construction
Backdoor
Spyware
Decompiler
Compiler
Stuxnet
Software
Computing
Computer programming

Technical Report UCAM-CL-TR-844 ISSN[removed]Number 844

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 1,17 MB

Share Document on Facebook

Similar Documents

Computing / Cyberwarfare / Computer security / Cryptography / Cybercrime / Computer network security / Backdoor / Rootkits / Google Play / Android / Firebase / Password

Poster: Design of Backdoor on Android Devices Junsung Cho, Geumhwan Cho, Sangwon Hyun and Hyoungshick Kim Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea Email: {js.cho, geumhwa

DocID: 1xVn0 - View Document

Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

DocID: 1uSMa - View Document

Backdoor.MAC.Eleanor Grants Attackers Full Access to Mac Systems A. Description: The application name is EasyDoc Converter.app, and its main functionality should be to convert documents, but it does anything but that. I

DocID: 1tYVb - View Document

Exploring the impact of a hard drive backdoor Jonas Zaddach <> Outline

DocID: 1tU6x - View Document

While parents and educators are busy fighting Common Core and high stakes testing, corporate reformers are sneaking into the backdoor of our public schools in other ways. Alison McDowell, a Philadelphia parent and educat

DocID: 1tx16 - View Document