-
1
-
-
84893216996
-
-
HDD Guru Forums, 2013. URL http://forum.hddguru.com/.
-
(2013)
HDD Guru Forums
-
-
-
2
-
-
84893217851
-
-
(a.k.a. Sprite tm) Talk given at OHM
-
Jeroen Domburg (a.k.a. Sprite tm). HDD Hacking. URL http://spritesmods. com/?art=hddhack. Talk given at OHM 2013.
-
(2013)
HDD Hacking
-
-
Domburg, J.1
-
4
-
-
84893314590
-
-
backupworks.com
-
backupworks.com. HDD Market Share - Rankings in 2Q12, 2012. URL http://www.backupworks.com/hdd-market-share-western-digital-seagate.aspx.
-
(2012)
HDD Market Share - Rankings in 2Q12
-
-
-
5
-
-
77951199250
-
Cisco architecture for lawful intercept in IP networks
-
October
-
F. Baker, B. Foster, and C. Sharp. Cisco Architecture for Lawful Intercept in IP Networks. RFC 3924 (Informational), October 2004. URL http://www.ietf.org/rfc/rfc3924.txt.
-
(2004)
RFC 3924 (Informational)
-
-
Baker, F.1
Foster, B.2
Sharp, C.3
-
6
-
-
38349073315
-
The price of safety: Evaluating IOMMU performance
-
Ottawa, Canada
-
M. Ben-Yehuda, J. Xenidis, M. Ostrowski, K. Rister, A. Bruemmer, and L. van Doorn. The Price of Safety: Evaluating IOMMU Performance. In The Ottawa Linux Symposium, pages 9-20, Ottawa, Canada, 2007.
-
(2007)
The Ottawa Linux Symposium
, pp. 9-20
-
-
Ben-Yehuda, M.1
Xenidis, J.2
Ostrowski, M.3
Rister, K.4
Bruemmer, A.5
Van Doorn, L.6
-
9
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
Chicago, USA ISBN 978-1-60558-894-0
-
C. Castelluccia, A. Francillon, D. Perito, and C. Soriente. On the difficulty of software-based attestation of embedded devices. In Conference on Computer and Communications Security, pages 400-409, Chicago, USA, 2009. ISBN 978-1-60558-894-0.
-
(2009)
Conference on Computer and Communications Security
, pp. 400-409
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
12
-
-
84893315599
-
-
Daemon9
-
Daemon9. Project Loki. Phrack 49. URL http://www.phrack.org/issues.html? id=6&issue=49.
-
Project Loki
-
-
-
13
-
-
84872116282
-
Owned by an iPod: Firewire/1394 issues
-
M. Dornseif. Owned by an iPod: Firewire/1394 Issues. PacSec, http://md.hudora.de/presentations/firewire/PacSec2004.pdf, 2004.
-
(2004)
PacSec
-
-
Dornseif, M.1
-
17
-
-
79953070187
-
Ensuring operating system kernel integrity with OSck
-
Newport Beach, USA ISBN 978-1-4503-0266-1
-
O.S. Hofmann, A.M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with OSck. In Conference on Architectural Support for Programming Languages and Operating Systems, pages 279-290, Newport Beach, USA, 2011. ISBN 978-1-4503-0266-1.
-
(2011)
Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 279-290
-
-
Hofmann, O.S.1
Dunn, A.M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
18
-
-
84893298567
-
-
IOZone
-
IOZone. IOZone, 2013. URL http://www.iozone.org/.
-
(2013)
-
-
-
19
-
-
85084095841
-
Designing and implementing malicious hardware
-
San Francisco, USA
-
S.T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou. Designing and Implementing Malicious Hardware. In Workshop on Large-scale Exploits and Emergent Threats, San Francisco, USA, 2008.
-
(2008)
Workshop on Large-scale Exploits and Emergent Threats
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
20
-
-
84893327666
-
-
Kingston. Secure USB Flash Drives, 2013. URL http://www.kingston.com/us/ usb/encrypted-security.
-
(2013)
Secure USB Flash Drives
-
-
-
22
-
-
80755144042
-
VIPER: Verifying the integrity of PERipherals' firmware
-
Chicago, USA ISBN 978-1-4503-0948-6
-
Y. Li, J.M. McCune, and A. Perrig. VIPER: Verifying the Integrity of PERipherals' Firmware. In Conference on Computer and Communications Security, pages 3-16, Chicago, USA, 2011. ISBN 978-1-4503-0948-6.
-
(2011)
Conference on Computer and Communications Security
, pp. 3-16
-
-
Li, Y.1
McCune, J.M.2
Perrig, A.3
-
24
-
-
85029521796
-
TRESOR runs encryption securely outside RAM
-
San Francisco, USA
-
T. Müller, F.C. Freiling, and A. Dewald. TRESOR runs encryption securely outside RAM. In USENIX Security Symposium, pages 17-17, San Francisco, USA, 2011. URL http://www.usenix.org/event/sec11/tech/full-papers/Muller.pdf.
-
(2011)
USENIX Security Symposium
, pp. 17-17
-
-
Müller, T.1
Freiling, F.C.2
Dewald, A.3
-
25
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
San Diego, USA
-
N.L. Petroni Jr, T. Fraser, J. Molina, and W.A. Arbaugh. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In USENIX Security Symposium, San Diego, USA, 2004. URL http://usenix.org/publications/library/ proceedings/sec04/tech/full-papers/petroni/petroni.pdf.
-
(2004)
USENIX Security Symposium
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
26
-
-
84893295620
-
-
RSA
-
RSA. Configuring the RSA II adapter, 2013. URL http://www.scribd.com/doc/ 3507950/RSAII-Card-Installation.
-
(2013)
Configuring the RSA II Adapter
-
-
-
27
-
-
77952353295
-
A chipset level network backdoor: Bypassing host-based firewall & IDS
-
Sydney, Australia ISBN 978-1-60558-394-5
-
S. Sparks, S. Embleton, and C.C. Zou. A Chipset Level Network Backdoor: Bypassing Host-Based Firewall & IDS. In Symposium on Information, Computer, and Communications Security, pages 125-134, Sydney, Australia, 2009. ISBN 978-1-60558-394-5.
-
(2009)
Symposium on Information, Computer, and Communications Security
, pp. 125-134
-
-
Sparks, S.1
Embleton, S.2
Zou, C.C.3
-
29
-
-
84976781807
-
Reflections on trusting trust
-
ISSN 0001-0782
-
K. Thompson. Reflections on Trusting Trust. Communications of the ACM, 27(8): 761-763, 1984. ISSN 0001-0782.
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
30
-
-
84893336076
-
Project maux mk.II, I 0wn the NIC, now I want a shell!
-
A. Triulzi. Project Maux Mk.II, I 0wn the NIC, now I want a Shell! In PacSec Conference, 2008. URL http://www.alchemistowl.org/arrigo/Papers/Arrigo- Triulzi-PACSEC08-Project-Maux-II.pdf.
-
(2008)
PacSec Conference
-
-
Triulzi, A.1
|