Sciweavers

3 search results - page 1 / 1
» RFID malware: Design principles and examples
Sort
View
PERCOM
2006
ACM
14 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
IJDE
2006
95views more  IJDE 2006»
13 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
HT
2003
ACM
13 years 10 months ago
"Physical hypermedia": organising collections of mixed physical and digital material
This paper addresses the problem of organizing material in mixed digital and physical environments. It presents empirical examples of how people use collectional artefacts and org...
Kaj Grønbæk, Jannie Friis Kristensen,...