نتایج جستجو برای: hardware trojan horses
تعداد نتایج: 123234 فیلتر نتایج به سال:
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design process. We show that third-party intellectual property cores and CAD tools constitute realistic attack surfaces and that even system specificatio...
This paper proposes a model to control information flows among objects. It improves flexibility of the control by independently assigning security levels to attributes, arguments, and return values. It uses associations and multiple labels to control information flows among objects that may be dynamically instantiated during program execution. According to our survey, no model offers the contro...
In today’s business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing – a constantly growing and evolving threat to Internet based comm...
LOMAC is a security enhancement for Linux kernels. LOMAC demonstrates that it is possible to apply Mandatory Access Control techniques to standard Linux kernels already deployed in the field, and to do so in a manner that is simple, compatible, and largely invisible to the traditional Linux user. The LOMAC Loadable Kernel Module protects the integrity of critical system processes and files from...
With ever advancing in digital system, security has been emerged as a major concern. Many researchers all around the world come up with solutions to address various challenges that are crucial for industry and market. The aim of this survey is a brief review of challenges of security validation as well as define and classify Hardware Trojans. Then, we provide more details about various validati...
Today, there are more than 6.1 billion smartphone users globally, which equates to approximately a per user. Out of the 2.6 smartphones, almost 4.2 those Android devices. is mobile operating system built on Linux kernel. As result, will increasingly be focus security measures because it can reveal great deal information about user and serve as gateway company's network. Since most popular syste...
Security threats and potential breaches can stem from a wide variety of vulnerabilities, ranging from simple password theft or spyware to Trojan horses, keyword sniffers and more. But the tactic that combines high levels of deception, great potential risk of loss and broad distribution is a new form of “man-in-themiddle” attack—real-time phishing. Man-in-the-middle attacks are not new—they’ve b...
The number of occurrences and severity of computerbased attacks such as viruses and worms, logic bombs, trojan horses, computer fraud, and plagiarism of code have become of increasing concern. In an attempt to better deal with these problems it is proposed that methods for examining the authorship of computer programs are necessary. This field is referred to here as software forensics. This inv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید