منابع مشابه
Stealthy Dopant-Level Hardware Trojans
With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...
متن کاملStealthy Dopant-Level Hardware Trojans
In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans i...
متن کاملStealthy Ciphertext
To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automate...
متن کاملTowards Stealthy Malware Detection1
Malcode can be easily hidden in document files and go undetected by standard technology. We demonstrate this opportunity of stealthy malcode insertion in several experiments using a standard COTS Anti-Virus (AV) scanner. Furthermore, in the case of zero-day malicious exploit code, signature-based AV scanners would fail to detect such malcode even if the scanner knew where to look. We propose th...
متن کاملTowards stealthy behaviors
This paper describes a behavior-based approach to stealth. The specific problem we consider is that of making stealthy traverses, i.e., transiting from one point to another while remaining hidden from an observer. Since we assume that the robot has no a priori model of the environment, our stealthy traverse behavior makes opportunistic use of terrain features to hide from the observer. This beh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptographic Engineering
سال: 2015
ISSN: 2190-8508,2190-8516
DOI: 10.1007/s13389-015-0102-5