Backdoor

Results: 134



#Item
41Breakthrough silicon scanning discovers backdoor in military chip  CHES2012 Workshop, Leuven, Belgium, 9-12 September 2012 Breakthrough silicon scanning discovers backdoor in military chip

Breakthrough silicon scanning discovers backdoor in military chip CHES2012 Workshop, Leuven, Belgium, 9-12 September 2012 Breakthrough silicon scanning discovers backdoor in military chip

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-09-07 13:28:11
42

PDF Document

Add to Reading List

Source URL: info.baesystemsdetica.com

Language: English - Date: 2015-04-24 20:24:24
43Espionage / ESET / Spam / Malware / Anti-spam techniques / Email spam / Botnet / Backdoor / ESET NOD32 / Spamming / Computing / Internet

Mumblehard targets servers running Linux and BSD

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-16 13:25:30
44[Black Hat DCAn Uninvited Guest  Black Hat DC 2010 Conference Proceedings  An Uninvited Guest (Who Won’t Go Home)

[Black Hat DCAn Uninvited Guest Black Hat DC 2010 Conference Proceedings An Uninvited Guest (Who Won’t Go Home)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
45A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1  Beijing Key Lab of Internet Security Technolo

A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
46NAPLAN / Writing / Debating / Persuasive writing

Podcast transcript Going beyond your backdoor: a collaborative persuasive writing project Fiona Banjer, teacher, Park Lake State School: ‘We wanted to get teachers involved in collaborating between themselves and bet

Add to Reading List

Source URL: education.qld.gov.au

Language: English - Date: 2013-04-04 21:06:32
47Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-02-11 00:25:06
48Visa Data Security Bulletin

Visa Data Security Bulletin

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2010-01-14 04:54:45
49Department of Homeland Security Daily Open Source Infrastructure Report

Department of Homeland Security Daily Open Source Infrastructure Report

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2015-04-08 19:14:18
50Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶

Add to Reading List

Source URL: www.ibr.cs.tu-bs.de

Language: English - Date: 2013-09-27 11:19:12