메뉴 건너뛰기




Volumn , Issue , 2013, Pages 279-288

Implementation and implications of a stealth hard-drive backdoor

Author keywords

[No Author keywords available]

Indexed keywords

ADDITIONAL EXPERIMENTS; CATASTROPHIC LOSS; COMMERCIAL OFF THE SHELVES; DATA REPLACEMENT; DATA-BASE SERVERS; DATABASE STORAGE; PUBLIC INFORMATION; SENSITIVE DATAS;

EID: 84893250536     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2523649.2523661     Document Type: Conference Paper
Times cited : (51)

References (30)
  • 1
    • 84893216996 scopus 로고    scopus 로고
    • HDD Guru Forums, 2013. URL http://forum.hddguru.com/.
    • (2013) HDD Guru Forums
  • 2
    • 84893217851 scopus 로고    scopus 로고
    • (a.k.a. Sprite tm) Talk given at OHM
    • Jeroen Domburg (a.k.a. Sprite tm). HDD Hacking. URL http://spritesmods. com/?art=hddhack. Talk given at OHM 2013.
    • (2013) HDD Hacking
    • Domburg, J.1
  • 4
    • 84893314590 scopus 로고    scopus 로고
    • backupworks.com
    • backupworks.com. HDD Market Share - Rankings in 2Q12, 2012. URL http://www.backupworks.com/hdd-market-share-western-digital-seagate.aspx.
    • (2012) HDD Market Share - Rankings in 2Q12
  • 5
    • 77951199250 scopus 로고    scopus 로고
    • Cisco architecture for lawful intercept in IP networks
    • October
    • F. Baker, B. Foster, and C. Sharp. Cisco Architecture for Lawful Intercept in IP Networks. RFC 3924 (Informational), October 2004. URL http://www.ietf.org/rfc/rfc3924.txt.
    • (2004) RFC 3924 (Informational)
    • Baker, F.1    Foster, B.2    Sharp, C.3
  • 7
    • 84872119145 scopus 로고    scopus 로고
    • TRESOR-HUNT: Attacking CPU-bound encryption
    • Orlando, USA ISBN 978-1-4503-1312-4
    • E.-O. Blass and W. Robertson. TRESOR-HUNT: Attacking CPU-Bound Encryption. In Annual Computer Security Applications Conference, pages 71-78, Orlando, USA, 2012. ISBN 978-1-4503-1312-4.
    • (2012) Annual Computer Security Applications Conference , pp. 71-78
    • Blass, E.-O.1    Robertson, W.2
  • 12
    • 84893315599 scopus 로고    scopus 로고
    • Daemon9
    • Daemon9. Project Loki. Phrack 49. URL http://www.phrack.org/issues.html? id=6&issue=49.
    • Project Loki
  • 13
    • 84872116282 scopus 로고    scopus 로고
    • Owned by an iPod: Firewire/1394 issues
    • M. Dornseif. Owned by an iPod: Firewire/1394 Issues. PacSec, http://md.hudora.de/presentations/firewire/PacSec2004.pdf, 2004.
    • (2004) PacSec
    • Dornseif, M.1
  • 18
    • 84893298567 scopus 로고    scopus 로고
    • IOZone
    • IOZone. IOZone, 2013. URL http://www.iozone.org/.
    • (2013)
  • 20
    • 84893327666 scopus 로고    scopus 로고
    • Kingston. Secure USB Flash Drives, 2013. URL http://www.kingston.com/us/ usb/encrypted-security.
    • (2013) Secure USB Flash Drives
  • 22
    • 80755144042 scopus 로고    scopus 로고
    • VIPER: Verifying the integrity of PERipherals' firmware
    • Chicago, USA ISBN 978-1-4503-0948-6
    • Y. Li, J.M. McCune, and A. Perrig. VIPER: Verifying the Integrity of PERipherals' Firmware. In Conference on Computer and Communications Security, pages 3-16, Chicago, USA, 2011. ISBN 978-1-4503-0948-6.
    • (2011) Conference on Computer and Communications Security , pp. 3-16
    • Li, Y.1    McCune, J.M.2    Perrig, A.3
  • 24
    • 85029521796 scopus 로고    scopus 로고
    • TRESOR runs encryption securely outside RAM
    • San Francisco, USA
    • T. Müller, F.C. Freiling, and A. Dewald. TRESOR runs encryption securely outside RAM. In USENIX Security Symposium, pages 17-17, San Francisco, USA, 2011. URL http://www.usenix.org/event/sec11/tech/full-papers/Muller.pdf.
    • (2011) USENIX Security Symposium , pp. 17-17
    • Müller, T.1    Freiling, F.C.2    Dewald, A.3
  • 25
    • 85084162914 scopus 로고    scopus 로고
    • Copilot - A coprocessor-based kernel runtime integrity monitor
    • San Diego, USA
    • N.L. Petroni Jr, T. Fraser, J. Molina, and W.A. Arbaugh. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In USENIX Security Symposium, San Diego, USA, 2004. URL http://usenix.org/publications/library/ proceedings/sec04/tech/full-papers/petroni/petroni.pdf.
    • (2004) USENIX Security Symposium
    • Petroni Jr., N.L.1    Fraser, T.2    Molina, J.3    Arbaugh, W.A.4
  • 26
    • 84893295620 scopus 로고    scopus 로고
    • RSA
    • RSA. Configuring the RSA II adapter, 2013. URL http://www.scribd.com/doc/ 3507950/RSAII-Card-Installation.
    • (2013) Configuring the RSA II Adapter
  • 27
    • 77952353295 scopus 로고    scopus 로고
    • A chipset level network backdoor: Bypassing host-based firewall & IDS
    • Sydney, Australia ISBN 978-1-60558-394-5
    • S. Sparks, S. Embleton, and C.C. Zou. A Chipset Level Network Backdoor: Bypassing Host-Based Firewall & IDS. In Symposium on Information, Computer, and Communications Security, pages 125-134, Sydney, Australia, 2009. ISBN 978-1-60558-394-5.
    • (2009) Symposium on Information, Computer, and Communications Security , pp. 125-134
    • Sparks, S.1    Embleton, S.2    Zou, C.C.3
  • 29
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • ISSN 0001-0782
    • K. Thompson. Reflections on Trusting Trust. Communications of the ACM, 27(8): 761-763, 1984. ISSN 0001-0782.
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 30
    • 84893336076 scopus 로고    scopus 로고
    • Project maux mk.II, I 0wn the NIC, now I want a shell!
    • A. Triulzi. Project Maux Mk.II, I 0wn the NIC, now I want a Shell! In PacSec Conference, 2008. URL http://www.alchemistowl.org/arrigo/Papers/Arrigo- Triulzi-PACSEC08-Project-Maux-II.pdf.
    • (2008) PacSec Conference
    • Triulzi, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.