Backdoors: Definition, Deniability and Detection
暂无分享,去创建一个
[1] J. D. Bjorken,et al. From China with love , 1982, Nature.
[2] Yin Zhang,et al. Detecting Backdoors , 2000, USENIX Security Symposium.
[3] Thomas Dullien,et al. Weird Machines, Exploitability, and Provable Unexploitability , 2020, IEEE Transactions on Emerging Topics in Computing.
[4] Sergey Bratus,et al. Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware , 2014, ACSAC '14.
[5] Chris Wysopal,et al. Static detection of application backdoors , 2010, Datenschutz und Datensicherheit - DuD.
[6] Herbert Bos,et al. Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract) , 2014, DIMVA.
[7] Tom Chothia,et al. HumIDIFy: A Tool for Hidden Functionality Detection in Firmware , 2017, DIMVA.
[8] Sergey Bratus,et al. "Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata , 2013, WOOT.
[9] Aurélien Francillon,et al. Implementation and implications of a stealth hard-drive backdoor , 2013, ACSAC.
[10] Christopher Krügel,et al. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware , 2015, NDSS.
[11] Tom Chothia,et al. Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality , 2017, ESORICS.
[12] Thorsten Holz,et al. Towards reducing the attack surface of software backdoors , 2013, CCS.
[13] Sergey Bratus,et al. Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code , 2011, WOOT.