Compiler Implementation Verification and Trojan Horses
ثبت نشده
چکیده
منابع مشابه
On Trojan Horses in Compiler Implementations
This paper is to present a security-related motivation for compiler veriication, and in particular for binary compiler implementation veriication. We will prove that source level veriication is not suu-cient in order to guarantee compiler correctness. For this, we will adopt the scenario of a well-known attack to Unix operating system programs due to intruded Trojan Horses in compiler executabl...
متن کاملHardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملAttitude Adjustment: Trojans and Malware on the Internet
This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses ...
متن کاملTROJAN: A Scalable Distributed Semantic Network System
This paper describes a new parallel semantic network system, the TROJAN. Unlike the synchronous and static marker passing algorithm previously used for parallel semantic network design, the TROJAN operates asynchronously, supporting knowledge sharing, dynamic load balancing and duplicate checking. Current implementation of the TROJAN focuses on path-based knowledge inferences, using ANSI C and ...
متن کاملEvent-Based Method for Detecting Trojan Horses in Mobile Devices
Mobile phones and wireless technology and its constant evolution have, in the last years, revolutionized the way in which we communicate and work. However, one of the main barriers encounter in the use of these technologies is data security. Trojan horses are dangerous software to attack phones, PDAs and Smartphones. New versions are created everyday to attack the functionality, theft the store...
متن کامل