Malicious

Results: 683



#Item
61New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana†

New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-06-19 19:48:47
    62Designing and implementing malicious hardware Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou University of Illinois at Urbana Champaign, Urbana, ILAbstract Hidden malic

    Designing and implementing malicious hardware Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou University of Illinois at Urbana Champaign, Urbana, ILAbstract Hidden malic

    Add to Reading List

    Source URL: www.usenix.org

    - Date: 2008-03-26 10:36:20
      63Malicious LUT: A Stealthy FPGA Trojan Injected and Triggered by the Design Flow Christian Krieg Clifford Wolf and Axel Jantsch

      Malicious LUT: A Stealthy FPGA Trojan Injected and Triggered by the Design Flow Christian Krieg Clifford Wolf and Axel Jantsch

      Add to Reading List

      Source URL: jantsch.se

      - Date: 2016-07-22 00:20:43
        64Global Research and Analysis Team Kaspersky Lab processes more than 325,000 new malicious files every day. While the majority are detected and analyzed automatically, a few require manual input from a security expert. Th

        Global Research and Analysis Team Kaspersky Lab processes more than 325,000 new malicious files every day. While the majority are detected and analyzed automatically, a few require manual input from a security expert. Th

        Add to Reading List

        Source URL: cdn.press.kaspersky.com

        - Date: 2015-10-30 16:26:19
          65Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Department of Computer Science and Engineering, University of Californ

          Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Department of Computer Science and Engineering, University of Californ

          Add to Reading List

          Source URL: www.cs.ucr.edu

          - Date: 2012-03-30 16:28:15
            66UNCLASSIFIED//FOR OFFICIAL USE ONLY  REFERENCE AID (U//FOUO) Malicious Terrorism Hoaxes Likely

            UNCLASSIFIED//FOR OFFICIAL USE ONLY REFERENCE AID (U//FOUO) Malicious Terrorism Hoaxes Likely

            Add to Reading List

            Source URL: info.publicintelligence.net

            - Date: 2016-11-21 17:43:52
              67A Characterization of Malicious Android Applications Lorenzo Gomez Iulian Neamtiu Department of Computer Science and Engineering University of California, Riverside {gomezl,neamtiu}@cs.ucr.edu

              A Characterization of Malicious Android Applications Lorenzo Gomez Iulian Neamtiu Department of Computer Science and Engineering University of California, Riverside {gomezl,neamtiu}@cs.ucr.edu

              Add to Reading List

              Source URL: www.lorenzobgomez.com

              - Date: 2012-08-19 21:31:07
                68Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Department of Computer Science and Engineering, University of Californ

                Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Department of Computer Science and Engineering, University of Californ

                Add to Reading List

                Source URL: www.lorenzobgomez.com

                - Date: 2012-08-19 21:31:08
                  69Submitted to IEEE Software and presented to the IRC.  Attacking Malicious Code: A report to the Infosec Research Council* Gary McGraw (Reliable Software Technologies) and Greg Morrisett (Cornell University)

                  Submitted to IEEE Software and presented to the IRC. Attacking Malicious Code: A report to the Infosec Research Council* Gary McGraw (Reliable Software Technologies) and Greg Morrisett (Cornell University)

                  Add to Reading List

                  Source URL: www.cs.cornell.edu

                  - Date: 2001-06-11 07:53:10
                    70Ransomware What is Ransomware? Ransomware is type of malicious software that will prevent you from accessing your files or whole computer until you pay the, usually few hundred pounds, ransom.

                    Ransomware What is Ransomware? Ransomware is type of malicious software that will prevent you from accessing your files or whole computer until you pay the, usually few hundred pounds, ransom.

                    Add to Reading List

                    Source URL: www.sbrcentre.co.uk

                    - Date: 2016-07-15 05:58:24