-
2
-
-
85180629253
-
-
OsmocomBB. http://bb.osmocom.org/trac/.
-
OsmocomBB
-
-
-
4
-
-
79955561437
-
IEEE-ISTO 5001 - 2003 the nexus 5001 forum standard for a global embedded processor debug interface
-
December
-
IEEE-ISTO 5001 - 2003 the nexus 5001 forum standard for a global embedded processor debug interface. IEEE - Industry Standards and Technology Organization, December 2003.
-
(2003)
IEEE - Industry Standards and Technology Organization
-
-
-
5
-
-
85180632251
-
-
CWSandbox, 2008. http://www.cwsandbox.org.
-
(2008)
CWSandbox
-
-
-
6
-
-
85164205772
-
AEG: Automatic exploit generation
-
(Feb)
-
AVGERINOS, T., CHA, S. K., HAO, B. L. T., AND BRUMLEY, D. AEG: Automatic exploit generation. In Network and Distributed System Security Symposium (Feb. 2011), pp. 283–300.
-
(2011)
Network and Distributed System Security Symposium
, pp. 283-300
-
-
AVGERINOS, T.1
CHA, S. K.2
HAO, B. L. T.3
BRUMLEY, D.4
-
7
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
(Berkeley, CA, USA), USENIX Association
-
BELLARD, F. QEMU, a fast and portable dynamic translator. In ATEC ’05: Proceedings of the annual conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2005), USENIX Association, pp. 41–41.
-
(2005)
ATEC ’05: Proceedings of the annual conference on USENIX Annual Technical Conference
, pp. 41-41
-
-
BELLARD, F.1
-
9
-
-
77952403312
-
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
-
(New York, NY, USA), CCS’07, ACM
-
CABALLERO, J., YIN, H., LIANG, Z., AND SONG, D. Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), CCS’07, ACM, pp. 317–329.
-
(2007)
Proceedings of the 14th ACM conference on Computer and communications security
, pp. 317-329
-
-
CABALLERO, J.1
YIN, H.2
LIANG, Z.3
SONG, D.4
-
10
-
-
67650790221
-
KLEE unassisted and automatic generation of high-coverage tests for complex systems programs
-
CADAR, C., DUNBAR, D., AND ENGLER, D. KLEE unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI (2008).
-
(2008)
OSDI
-
-
CADAR, C.1
DUNBAR, D.2
ENGLER, D.3
-
12
-
-
85061034567
-
Comprehensive Experimental Analysis of Automototive Attack Surfaces
-
(San Francisco, CA, August)
-
CHECKOWAY, S., MCCOY, D., ANDERSON, D., KANTOR, B., SAVAGE, S., KOSCHER, K., CZESKIS, A., ROESNER, F., AND KOHNO, T. Comprehensive Experimental Analysis of Automototive Attack Surfaces. In Proceedings of the USENIX Security Symposium (San Francisco, CA, August 2011).
-
(2011)
Proceedings of the USENIX Security Symposium
-
-
CHECKOWAY, S.1
MCCOY, D.2
ANDERSON, D.3
KANTOR, B.4
SAVAGE, S.5
KOSCHER, K.6
CZESKIS, A.7
ROESNER, F.8
KOHNO, T.9
-
13
-
-
0028377194
-
An in-circuit emulator for TMS320C25
-
CHING, P. C., CHENG, Y., AND KO, M. H. An in-circuit emulator for TMS320C25. IEEE Transactions on Education 37, 1 (1994), 51–56.
-
(1994)
IEEE Transactions on Education
, vol.37
, Issue.1
, pp. 51-56
-
-
CHING, P. C.1
CHENG, Y.2
KO, M. H.3
-
14
-
-
79953102839
-
Reverse Engineering of Binary Device Drivers with RevNIC
-
Paris France, April (Paris, France, 2010)
-
CHIPOUNOV, V., AND CANDEA, G. Reverse Engineering of Binary Device Drivers with RevNIC. In Proceedings of the 5th ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys), Paris France, April 2010 (Paris, France, 2010).
-
(2010)
Proceedings of the 5th ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys)
-
-
CHIPOUNOV, V.1
CANDEA, G.2
-
15
-
-
84859090239
-
The S2E Platform: Design, Implementation, and Applications
-
(Feb), 2:1–2:49
-
CHIPOUNOV, V., KUZNETSOV, V., AND CANDEA, G. The S2E Platform: Design, Implementation, and Applications. ACM Trans. Comput. Syst. 30, 1 (Feb. 2012), 2:1–2:49.
-
(2012)
ACM Trans. Comput. Syst
, vol.30
, Issue.1
-
-
CHIPOUNOV, V.1
KUZNETSOV, V.2
CANDEA, G.3
-
16
-
-
85059766484
-
Live migration of virtual machines
-
(Berkeley, CA, USA), NSDI’05, USENIX Association
-
CLARK, C., FRASER, K., HAND, S., HANSEN, J. G., JUL, E., LIMPACH, C., PRATT, I., AND WARFIELD, A. Live migration of virtual machines. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2 (Berkeley, CA, USA, 2005), NSDI’05, USENIX Association, pp. 273–286.
-
(2005)
Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
, pp. 273-286
-
-
CLARK, C.1
FRASER, K.2
HAND, S.3
HANSEN, J. G.4
JUL, E.5
LIMPACH, C.6
PRATT, I.7
WARFIELD, A.8
-
17
-
-
76749136584
-
Digging for data structures
-
(Berkeley, CA, USA), OSDI’08, USENIX Association
-
COZZIE, A., STRATTON, F., XUE, H., AND KING, S. T. Digging for data structures. In Proceedings of the 8th USENIX conference on Operating systems design and implementation (Berkeley, CA, USA, 2008), OSDI’08, USENIX Association, pp. 255–266.
-
(2008)
Proceedings of the 8th USENIX conference on Operating systems design and implementation
, pp. 255-266
-
-
COZZIE, A.1
STRATTON, F.2
XUE, H.3
KING, S. T.4
-
18
-
-
0020141260
-
Exception handling and software fault tolerance
-
CRISTIAN, F. Exception handling and software fault tolerance. IEEE Transactions on Computers C-31, 6 (1982), 531–540.
-
(1982)
IEEE Transactions on Computers C-31
, Issue.6
, pp. 531-540
-
-
CRISTIAN, F.1
-
19
-
-
85091294952
-
When firmware modifications attack: A case study of embedded exploitation
-
San Diego, California, USA, February 24-27, (2013), The Internet Society
-
CUI, A., COSTELLO, M., AND STOLFO, S. J. When firmware modifications attack: A case study of embedded exploitation. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013 (2013), The Internet Society.
-
(2013)
20th Annual Network and Distributed System Security Symposium, NDSS 2013
-
-
CUI, A.1
COSTELLO, M.2
STOLFO, S. J.3
-
20
-
-
84857285614
-
Defending embedded systems with software symbiotes
-
(Berlin, Heidelberg), RAID’11, Springer-Verlag
-
CUI, A., AND STOLFO, S. J. Defending embedded systems with software symbiotes. In Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection (Berlin, Heidelberg, 2011), RAID’11, Springer-Verlag, pp. 358–377.
-
(2011)
Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection
, pp. 358-377
-
-
CUI, A.1
STOLFO, S. J.2
-
21
-
-
70349283250
-
Tupni: automatic reverse engineering of input formats
-
(New York, NY, USA), ACM
-
CUI, W., PEINADO, M., CHEN, K., WANG, H. J., AND IRUN-BRIZ, L. Tupni: automatic reverse engineering of input formats. In CCS ’08: Proceedings of the 15th ACM conference on Computer and communications security (New York, NY, USA, 2008), ACM, pp. 391–402.
-
(2008)
CCS ’08: Proceedings of the 15th ACM conference on Computer and communications security
, pp. 391-402
-
-
CUI, W.1
PEINADO, M.2
CHEN, K.3
WANG, H. J.4
IRUN-BRIZ, L.5
-
22
-
-
85075533110
-
FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution
-
(Washington, DC, August)
-
DAVIDSON, D., MOENCH, B., JHA, S., AND RISTENPART, T. FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution. In Proceedings of the USENIX Security Symposium (Washington, DC, August 2013).
-
(2013)
Proceedings of the USENIX Security Symposium
-
-
DAVIDSON, D.1
MOENCH, B.2
JHA, S.3
RISTENPART, T.4
-
24
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
(Mar), 6:1–6:42
-
EGELE, M., SCHOLTE, T., KIRDA, E., AND KRUEGEL, C. A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44, 2 (Mar. 2008), 6:1–6:42.
-
(2008)
ACM Comput. Surv
, vol.44
, Issue.2
-
-
EGELE, M.1
SCHOLTE, T.2
KIRDA, E.3
KRUEGEL, C.4
-
29
-
-
84857600799
-
SAGE: whitebox fuzzing for security testing
-
GODEFROID, P., LEVIN, M. Y., AND MOLNAR, D. SAGE: whitebox fuzzing for security testing. Communications of The ACM (2012), 40–44.
-
(2012)
Communications of The ACM
, pp. 40-44
-
-
GODEFROID, P.1
LEVIN, M. Y.2
MOLNAR, D.3
-
30
-
-
84954469022
-
Dowsing for overflows: A guided fuzzer to find buffer boundary violations
-
(Washington, DC, August), USENIX
-
HALLER, I., SLOWINSKA, A., NEUGSCHWANDTNER, M., AND BOS, H. Dowsing for overflows: A guided fuzzer to find buffer boundary violations. In Proceedings of USENIX Security’13 (Washington, DC, August 2013), USENIX.
-
(2013)
Proceedings of USENIX Security’13
-
-
HALLER, I.1
SLOWINSKA, A.2
NEUGSCHWANDTNER, M.3
BOS, H.4
-
31
-
-
84862948578
-
A dynamic analysis system for Cisco IO based on virtualization
-
HAN, Y., LIU, S., SU, X., AND HU, Z. A dynamic analysis system for Cisco IO based on virtualization. In Multimedia Information Networking and Security (MINES), 2011 Third International Conference on (2011), pp. 330–332.
-
(2011)
Multimedia Information Networking and Security (MINES), 2011 Third International Conference on
, pp. 330-332
-
-
HAN, Y.1
LIU, S.2
SU, X.3
HU, Z.4
-
33
-
-
84866721423
-
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
-
(San Diego, CA, Feb)
-
KANG, M. G., MCCAMANT, S., POOSANKAM, P., AND SONG, D. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (San Diego, CA, Feb. 2011).
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium
-
-
KANG, M. G.1
MCCAMANT, S.2
POOSANKAM, P.3
SONG, D.4
-
34
-
-
70349448915
-
Renovo: a hidden code extractor for packed executables
-
(New York, NY, USA), WORM ’07, ACM
-
KANG, M. G., POOSANKAM, P., AND YIN, H. Renovo: a hidden code extractor for packed executables. In Proceedings of the 2007 ACM workshop on Recurring malcode (New York, NY, USA, 2007), WORM ’07, ACM, pp. 46–53.
-
(2007)
Proceedings of the 2007 ACM workshop on Recurring malcode
, pp. 46-53
-
-
KANG, M. G.1
POOSANKAM, P.2
YIN, H.3
-
35
-
-
55349134527
-
Hardware-software approaches to in-circuit emulation for embedded processors
-
KAO, C.-F., HUANG, I.-J., AND CHEN, H.-M. Hardware-software approaches to in-circuit emulation for embedded processors. Design Test of Computers, IEEE 25, 5 (2008), 462–477.
-
(2008)
Design Test of Computers, IEEE
, vol.25
, Issue.5
, pp. 462-477
-
-
KAO, C.-F.1
HUANG, I.-J.2
CHEN, H.-M.3
-
37
-
-
79953099806
-
Testing closed-source binary device drivers with DDT
-
(Berkeley, CA, USA), USENIXATC’10, USENIX Association
-
KUZNETSOV, V., CHIPOUNOV, V., AND CANDEA, G. Testing closed-source binary device drivers with DDT. In Proceedings of the 2010 USENIX conference on USENIX annual technical conference (Berkeley, CA, USA, 2010), USENIXATC’10, USENIX Association, pp. 12–12.
-
(2010)
Proceedings of the 2010 USENIX conference on USENIX annual technical conference
, pp. 12-12
-
-
KUZNETSOV, V.1
CHIPOUNOV, V.2
CANDEA, G.3
-
38
-
-
84863456769
-
Efficient state merging in symbolic execution
-
(New York, NY, USA), PLDI’12, ACM
-
KUZNETSOV, V., KINDER, J., BUCUR, S., AND CANDEA, G. Efficient state merging in symbolic execution. In Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (New York, NY, USA, 2012), PLDI’12, ACM, pp. 193–204.
-
(2012)
Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 193-204
-
-
KUZNETSOV, V.1
KINDER, J.2
BUCUR, S.3
CANDEA, G.4
-
39
-
-
3042658703
-
LLVM: A compilation framework for lifelong program analysis & transformation
-
IEEE
-
LATTNER, C., AND ADVE, V. LLVM: A compilation framework for lifelong program analysis & transformation. In International Symposium on Code Generation and Optimization, 2004. CGO 2004. (2004), IEEE, pp. 75–86.
-
(2004)
International Symposium on Code Generation and Optimization, 2004. CGO 2004
, pp. 75-86
-
-
LATTNER, C.1
ADVE, V.2
-
40
-
-
79951794167
-
Replay debugging for multi-threaded embedded software
-
LEE, Y.-H., SONG, Y. W., GIRME, R., ZAVERI, S., AND CHEN, Y. Replay debugging for multi-threaded embedded software. In Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on (2010), pp. 15–22.
-
(2010)
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on
, pp. 15-22
-
-
LEE, Y.-H.1
SONG, Y. W.2
GIRME, R.3
ZAVERI, S.4
CHEN, Y.5
-
41
-
-
84887424637
-
Dynamic analysis and debugging of binary code for security applications
-
Springer
-
LI, L., AND WANG, C. Dynamic analysis and debugging of binary code for security applications. In 4th International Conference on Runtime Verification (RV) 2013, Rennes, France, September 24-27, 2013. Proceedings (2013), vol. 8174 of Lecture Notes in Computer Science, Springer, pp. 403–423.
-
4th International Conference on Runtime Verification (RV) 2013, Rennes, France, September 24-27, 2013. Proceedings (2013), vol. 8174 of Lecture Notes in Computer Science
, pp. 403-423
-
-
LI, L.1
WANG, C.2
-
42
-
-
0031364664
-
Emulation techniques for microcontrollers
-
MELEAR, C. Emulation techniques for microcontrollers. In Wescon/97. Conference Proceedings (1997), pp. 532–541.
-
(1997)
Wescon/97. Conference Proceedings
, pp. 532-541
-
-
MELEAR, C.1
-
43
-
-
33746690237
-
-
Tech. rep., IETF, September
-
MONTENEGRO, G., KUSHALNAGAR, N., HUI, J., AND CULLER, D. Transmission of IPv6 packets over IEEE 802.15.4 networks (RFC 4944). Tech. rep., IETF, September 2007. http://www.ietf.org/rfc/rfc4944.txt.
-
(2007)
Transmission of IPv6 packets over IEEE 802.15.4 networks (RFC 4944)
-
-
MONTENEGRO, G.1
KUSHALNAGAR, N.2
HUI, J.3
CULLER, D.4
-
44
-
-
85076499660
-
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale
-
(San Francisco, CA, USA, August)
-
MULLINER, C., GOLDE, N., AND SEIFERT, J.-P. SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale. In Proceedings of the 20th USENIX Security Symposium (San Francisco, CA, USA, August 2011).
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
MULLINER, C.1
GOLDE, N.2
SEIFERT, J.-P.3
-
45
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
(Berkeley, CA, USA), USENIX Association
-
NOHL, K., EVANS, D., STARBUG, S., AND PLÖTZ, H. Reverse-engineering a cryptographic RFID tag. In Proceedings of the 17th conference on Security symposium (Berkeley, CA, USA, 2008), USENIX Association, pp. 185–193.
-
(2008)
Proceedings of the 17th conference on Security symposium
, pp. 185-193
-
-
NOHL, K.1
EVANS, D.2
STARBUG, S.3
PLÖTZ, H.4
-
46
-
-
78651389795
-
Can you still trust your network card?
-
CanSecWest
-
PEREZ, Y.-A., AND DUFLOT, L. Can you still trust your network card? CanSecWest 2010.
-
(2010)
-
-
PEREZ, Y.-A.1
DUFLOT, L.2
-
48
-
-
84877705477
-
SymDrive: testing drivers without devices
-
(Berkeley, CA, USA), OSDI’12, USENIX Association
-
RENZELMANN, M. J., KADAV, A., AND SWIFT, M. M. SymDrive: testing drivers without devices. In Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation (Berkeley, CA, USA, 2012), OSDI’12, USENIX Association, pp. 279–292.
-
(2012)
Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
, pp. 279-292
-
-
RENZELMANN, M. J.1
KADAV, A.2
SWIFT, M. M.3
-
49
-
-
77950801061
-
Model checking of software for microcontrollers
-
(Apr), 36:1–36:27
-
SCHLICH, B. Model checking of software for microcontrollers. ACM Trans. Embed. Comput. Syst. 9, 4 (Apr. 2010), 36:1–36:27.
-
(2010)
ACM Trans. Embed. Comput. Syst
, vol.9
, Issue.4
-
-
SCHLICH, B.1
-
50
-
-
84884527765
-
Inferring invariants by symbolic execution
-
B. Beckert, Ed., of CEUR Workshop Proceedings, CEUR-WS.org
-
SCHMITT, P. H., AND WEISS, B. Inferring invariants by symbolic execution. In Proceedings, 4th International Verification Workshop (VERIFY’07) (2007), B. Beckert, Ed., vol. 259 of CEUR Workshop Proceedings, CEUR-WS.org, pp. 195–210.
-
(2007)
Proceedings, 4th International Verification Workshop (VERIFY’07)
, vol.259
, pp. 195-210
-
-
SCHMITT, P. H.1
WEISS, B.2
-
51
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
(Washington, DC, USA), SP’10, IEEE Computer Society
-
SCHWARTZ, E. J., AVGERINOS, T., AND BRUMLEY, D. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proceedings of the 2010 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2010), SP’10, IEEE Computer Society, pp. 317–331.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 317-331
-
-
SCHWARTZ, E. J.1
AVGERINOS, T.2
BRUMLEY, D.3
-
52
-
-
84951736831
-
Howard: A dynamic excavator for reverse engineering data structures
-
San Diego, California, USA, 6th February 9th February (2011)
-
SLOWINSKA, A., STANCESCU, T., AND BOS, H. Howard: A dynamic excavator for reverse engineering data structures. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011 (2011).
-
(2011)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2011
-
-
SLOWINSKA, A.1
STANCESCU, T.2
BOS, H.3
-
53
-
-
70449684394
-
Bit-blaze: A new approach to computer security via binary analysis
-
SONG, D., BRUMLEY, D., CABALLERO, J., JAGER, I., KANG, M. G., LIANG, Z., NEWSOME, J., POOSANKAM, P., AND SAXENA, P. Bit-blaze: A new approach to computer security via binary analysis. In In Proceedings of the 4th International Conference on Information Systems Security (2008).
-
(2008)
Proceedings of the 4th International Conference on Information Systems Security
-
-
SONG, D.1
BRUMLEY, D.2
CABALLERO, J.3
JAGER, I.4
KANG, M. G.5
LIANG, Z.6
NEWSOME, J.7
POOSANKAM, P.8
SAXENA, P.9
-
55
-
-
77955183968
-
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
-
WANG, T., WEI, T., GU, G., AND ZOU, W. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. In IEEE Symposium on Security and Privacy (2010), pp. 497–512.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 497-512
-
-
WANG, T.1
WEI, T.2
GU, G.3
ZOU, W.4
-
56
-
-
85084163551
-
Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks
-
(Berkeley, CA, USA), WOOT’12, USENIX Association
-
WEINMANN, R.-P. Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks. In Proceedings of the 6th USENIX conference on Offensive Technologies (Berkeley, CA, USA, 2012), WOOT’12, USENIX Association, pp. 2–2.
-
(2012)
Proceedings of the 6th USENIX conference on Offensive Technologies
, pp. 2-2
-
-
WEINMANN, R.-P.1
-
58
-
-
84872570308
-
ARMV8 debug and trace architectures
-
WILLIAMS, M. ARMV8 debug and trace architectures. In System, Software, SoC and Silicon Debug Conference (S4D), 2012 (2012), pp. 1–6.
-
(2012)
System, Software, SoC and Silicon Debug Conference (S4D)
, vol.2012
, pp. 1-6
-
-
WILLIAMS, M.1
-
59
-
-
0038684791
-
A”flight data recorder” for enabling full-system multiprocessor deterministic replay
-
(New York, NY, USA), ISCA’03, ACM
-
XU, M., BODIK, R., AND HILL, M. D. A”flight data recorder” for enabling full-system multiprocessor deterministic replay. In Proceedings of the 30th annual international symposium on Computer architecture (New York, NY, USA, 2003), ISCA’03, ACM, pp. 122–135.
-
(2003)
Proceedings of the 30th annual international symposium on Computer architecture
, pp. 122-135
-
-
XU, M.1
BODIK, R.2
HILL, M. D.3
-
60
-
-
84893250536
-
Implementation and implications of a stealth hard-drive backdoor
-
December 9-13, New Orleans, Louisiana, USA (New orleans, UNITED STATES, 12 2013)
-
ZADDACH, J., KURMUS, A., BALZAROTTI, D., BLASS, E. O., FRANCILLON, A., GOODSPEED, T., GUPTA, M., AND KOLTSIDAS, I. Implementation and implications of a stealth hard-drive backdoor. In ACSAC 2013, 29th Annual Computer Security Applications Conference, December 9-13, 2013, New Orleans, Louisiana, USA (New orleans, UNITED STATES, 12 2013).
-
(2013)
ACSAC 2013, 29th Annual Computer Security Applications Conference
-
-
ZADDACH, J.1
KURMUS, A.2
BALZAROTTI, D.3
BLASS, E. O.4
FRANCILLON, A.5
GOODSPEED, T.6
GUPTA, M.7
KOLTSIDAS, I.8
|