Trojan horses

Results: 71



#Item
11Trojan horses / National security / Crime prevention / Cyberwarfare / Hacking / SpyEye / Computer security / Zeus / Malware / Kill chain / Vulnerability / RSA Security

The Exploit Intelligence Project Dan Guido —————————

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
12Espionage / Computer security / Cyberwarfare / Computer network security / Trojan horses / Identity theft / Rogue software / Spyware / Morgan Marquis-Boire / Hacking Team / Proxy server / Citizen Lab

Research Brief March 2014 The Citizen Lab Hacking Team’s US Nexus

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:24
13Malware / Computing / Cyberwarfare / Statistical classification / Trojan horses / Botnets / Machine learning / Antivirus software / Malware analysis / Support vector machine / Zeus / Computer virus

Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:00
14Cyberwarfare / Computer security / Ifconfig / Password / Hacker / Network security / Rootkits / Trojan horses / System software / Computing / Malware

Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:43
15Physical Unclonable Function / Randomness / Elliptic curve cryptography / Side channel attack / PUF / LEX / Hardware Trojan / Digital rights management / Joint Test Action Group / Cryptography / Advanced Encryption Standard / Trojan horses

HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2010-10-16 10:23:01
16Computer security / Fault injection / Booz Allen Hamilton / Side channel attack / Cyberwarfare / Espionage / Security / Trojan horses / Hardware Trojan

Microsoft Word - HOST2015_Program_v10.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2015-05-05 13:55:29
17Procedural programming languages / C / ALGOL 68 / Printf format string / D / Fortran / Unix / Quine / PL/I / Computing / Computer programming / Software engineering

TURING AWARD LECTURE Reflections on Trusting Trust To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

Add to Reading List

Source URL: nuwen.net

Language: English - Date: 2008-01-05 16:29:23
18Computer network security / Cyberwarfare / Social engineering / Spyware / Physical Unclonable Function / Computer security / Field-programmable gate array / Security / Trojan horses / Hardware Trojan

HOST2nd IEEE International Workshop on Hardware-Oriented Security and Trust July 27, 2009, Moscone Center, Room 304, San Francisco, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:42:52
19Computer network security / Computer security / DAFCA / Public safety / Trojan horses / Hardware Trojan / Security

HOSTIEEE International Workshop on Hardware-Oriented Security and Trust June 9, 2008, Anaheim Convention Center, Room 204A, Anaheim, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:35:29
20Value added tax / Installation / Windows Server / Remote administration software / Trojan horses / System software / Software / Tax reform

Instructions of the Membis Network Installation

Add to Reading List

Source URL: www.membis.fi

Language: English - Date: 2007-06-04 13:33:12
UPDATE