Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Invasive Software (D.4.6...)  
 
Options:
 
  1-8 of 8 Reviews about "Invasive Software (D.4.6...)": Date Reviewed
  Effective usage of redundancy to aid neutralization of hardware Trojans in integrated circuits
Gunti N., Lingasubramanian K. Integration, the VLSI Journal 59 233-242, 2017.  Type: Article

Hardware Trojans (HTs) are a major concern in cyber-physical systems security. Outsourcing activities related to the design and implementation of digital systems expose them to malicious modification. Such modifications may long stay s...

Nov 22 2017
  iOS hacker’s handbook
Miller C., Blazakis D., Dai Zovi D., Esser S., Iozzo V., Weinmann R., Wiley Publishing, Indianapolis, IN, 2012. 408 pp.  Type: Book (978-1-118204-12-2)

With the extensive use of iOS devices all over the world, threats become more harmful. Think of a monoculture in food production: natural plagues become real menaces to subsistence when larger and larger tracts of land are dedicated to...

Feb 5 2013
  A chipset level network backdoor: bypassing host-based firewall & IDS
Sparks S., Embleton S., Zou C.  ASIACCS 2009 (Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, Mar 10-12, 2009) 125-134, 2009.  Type: Proceedings

The cost of ignoring a theoretical flaw of host-based firewall solutions such as Zone Alarm or the popular Windows XP firewall is confirmed in practice in this paper. There is an unsolved ambiguity at the root of the design of these se...

Sep 8 2009
  Feasibility of multi-protocol attacks
Cremers C.  Availability, reliability and security (Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06),Apr 20-22, 2006) 287-294, 2006.  Type: Proceedings

The relatively new topic of multiprotocol attacks is the focus of this well-researched paper. Until now, most studies of this kind have analyzed the effects of attacks through a single protocol. However, it has been found that protocol...

Mar 14 2007
  Hop integrity: a defense against denial-of-service attacks (Advances in Information Security)
Huang C., Gouda M., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 112 pp.  Type: Book (9780387244266)

Spam, phishing, and denial of service attacks are among the various schemes that can diminish the value of the Internet. Many solutions have been proposed to try to maintain the integrity and trustworthiness of the Internet. This monog...

Sep 26 2006
  Defense and detection strategies against Internet worms
Nazario J., Artech House, Inc., Norwood, MA, 2003.  Type: Book (9781580535373)

Internet worms are a typical example of invasive software. They are different from viruses, cause significant damage to computer networks, and have the ability to disrupt millions of computers all over the world, in a very short time s...

Sep 23 2004
  A novel computer architecture to prevent destruction by viruses: volume management and system tuning
Qingshi G., Yue H., Lei L., Xu C., Honglan L. Journal of Computer Science and Technology 17(3): 241-248, 2002.  Type: Article

Described in this paper is a trusted computer environment for PCs that are connected to the Internet, or that receive input from unknown sources....

Jun 25 2003
  Abstraction-based intrusion detection in distributed environments
Ning P. (ed), Jajodia S., Wang X. ACM Transactions on Information and System Security 4(4): 407-452, 2001.  Type: Article

A new model for creating distributed intrusion detection systems is presented in this paper. The model uses three concepts: system views, signatures, and view definitions. The system view provides an abstract representation of a specif...

Jun 24 2002
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy