Back to Results
First PageMeta Content
Disk encryption / Malware / Cryptographic software / Computer storage / Computer security / Rootkit / RAID / Solid-state drive / Cache / Computing / Software / System software


Implementation and Implications of a Stealth Hard-Drive Backdoor Jonas Zaddach†∗ Anil Kurmus‡∗ Travis Goodspeed¶
Add to Reading List

Document Date: 2013-10-14 04:14:22


Open Document

File Size: 799,75 KB

Share Result on Facebook

City

San Francisco / Sophia Antipolis / Ottawa / Bypassing Host / Orlando / Sydney / Newport Beach / Zurich / Kingston / Coprocessor / San Diego / Chicago / /

Company

Maxtor / GPU / Seagate / AMD / IP Networks / Trusting Trust / IBM / Implementing Malicious Hardware / Sony / Cisco / Western Digital / IDT / MySQL / Intel / SATA / /

Country

Switzerland / France / Canada / Australia / United States / /

Currency

PHP / /

/

Event

Product Issues / /

Facility

Northeastern University / SATA port / College of Computer / /

IndustryTerm

network-based intrusion detection systems / storage devices / system utilities / infected storage device / untrusted storage device / software-based encryption offer full protection / intrusion detection systems / forensics tools / web application / storage device / well-behaved block devices / software updates / block device / printing jobs / manufacturing process / database server / software breakpoints / web forum / target storage device / software breakpoint / hardware devices / deterministic cache-eviction algorithms / web server / compromised supply chain / firmware update tool / Apache web server / cloud services / debugger stub fully in software / malicious processor / software vendors / malicious storage device / compromised storage device / web forums / hard-disk encryption systems / unmodified web server / software components / hardware device / web service / software-based attestation / cyber-espionage tools / malicious hardware / Internet banking / direct internet connectivity / network services / adequate solutions / arbitrary storage devices / Internet-based services / system-virtualization software / software disk encryption / higher-level protocol / bridge chips / web services / /

OperatingSystem

UNIX / Ubuntu / VxWorks / Linux / GNU / /

Organization

College of Computer / Department of Computer Science and Engineering / UCSD / ASIC / European Union / Northeastern University / Boston / US National Science Foundation / Federal Government / College of Computer and Information Science / /

Person

Cache / Ioannis Koltsidas / Erik-Oliver Blass§ Moitrayee Guptak / J. Molina / S.T. King / Ken Thompson / Richard G. Ramsdell / Y. Zhou / Jonas Zaddach†∗ Anil / T. Fraser / W.A. Arbaugh / Travis Goodspeed¶ Davide Balzarotti / Romeo N. Nolasco / C. Grier / J. Tucek / Anil Kurmus‡∗ Travis / N.L. Petroni Jr / John C. Fravel / A. Cozzie / W. Jiang / Robert A. Caldeira / X. Finally / /

Position

SATA/IDE Controller / King / administrator / manager / filesystem driver / and block device driver / reverse engineer / controller / internal SATA controller / /

Product

IOZone / Malicious Payloads Our / iPod / data / /

ProgrammingLanguage

SQL / PHP / DC / /

PublishedMedium

Communications of the ACM / /

Technology

FPGA / RAM / deterministic cache-eviction algorithms / malicious processor / Hardware-Based Disk Encryption / Linux / Disk encryption / VxWorks / cache memory / secret key / SRAM / operating system / RAID / encryption / higher-level protocol / RAM System / 4.1 Encryption / antivirus software / CPU-Bound Encryption / FLASH / SATA protocol / virtual machine / PHP / serial FLASH chip / UNIX / disk drive / bridge chips / ATA protocol / operating systems / pdf / randomization-modified LRU-2 algorithm / Myrinet protocols / ASIC / public key / Flash memory / using software disk encryption / Storage Area Network / firewall / HTTP / Caching / system-level encryption / SAN / simulation / DSP / web server / SCSI / /

URL

http /

SocialTag