Sciweavers

47 search results - page 1 / 10
» Hunting Trojan Horses
Sort
View
ASPLOS
2006
ACM
13 years 11 months ago
Hunting Trojan Horses
Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zh...
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
13 years 11 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
SACMAT
2009
ACM
13 years 11 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
ARESEC
2011
76views more  ARESEC 2011»
12 years 5 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon