Interdiction in practice—Hardware Trojan against a high-security USB flash drive

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless USB flash drive

The aim of this paper is to design a Wireless USB flash drive in which the USB flash drive can be used without connecting using the dongle. This makes the data transfer using USB more sophisticated. It also provides speed upto 1 Mbps

متن کامل

Development of a Personal Health Record System Based on USB Flash Drive and Web Service

Objective: The development of information communication technology (ICT) and the demand for managing the healthy lives of individuals are accelerating the informatization of the health and medical field. Considering this environment and the needs of the individual, this paper has designed and developed a web and mobile storage device-based personal health record (PHR) system that individuals ca...

متن کامل

Secure Data Deletion for USB Flash Memory

People commonly use USB flash memory because of its convenience and portability. It stores various data such as documents, pictures, certificates, and private data (e.g., passwords, account numbers). These data, especially private data, should not be revealed to the outside. However, even when the stored data is deleted, these data can be recovered using data recovery programs. To prevent this ...

متن کامل

USB Keyboard Security Unit

24 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract— Every user has its specific rhythm of typing which could be used as a biometrics in order to build some kind of "footprint" – unique profile. If somebody gets to know this profile, legitimate user is endangered by tracking and being impersonated. That is the way typing rhythm must be protected. We des...

متن کامل

Analysis of USB Flash Drives in a Virtual Environment

This paper is a continuation of our previous work [1] in which we proposed an approach where two environments, conventional and virtual, are used independently in the forensic analysis of computer systems. We discuss the use of virtual environments in the analysis of USB flash drives in computer forensics investigations. After briefly introducing general concepts of a virtual environment and so...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptographic Engineering

سال: 2016

ISSN: 2190-8508,2190-8516

DOI: 10.1007/s13389-016-0132-7