Back to Results
First PageMeta Content
Central processing unit / Computer network security / Malware / Rootkit / LEON / CPU cache / Ring / Password / Kernel / Computer hardware / Computer security / Computing


Designing and implementing malicious hardware Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou University of Illinois at Urbana Champaign, Urbana, IL[removed]Abstract Hidden malic
Add to Reading List

Document Date: 2010-06-10 18:45:38


Open Document

File Size: 110,32 KB

Share Result on Facebook

City

Urbana / New York / Hypervisor / Washington / DC / London / /

Company

IBM / AES / Message-Passing Systems / ACM Press / Intel Corporation / UDP C HECKS UM CO / Apple Computer Inc. / Xilinx / Maxtor / The Washington Post / /

Continent

Europe / /

Country

Taiwan / United States / United Kingdom / /

Currency

USD / /

Facility

Yuanyuan Zhou University of Illinois / /

IndustryTerm

tool chain / security applications / supply chain / communications security / physical hardware / software-based attacks / unprivileged malicious software / synthesizable processor / software memory protection / baseline processor / modified devices / individual chips / manufacturing locations / unprivileged software / larger processor / watchpoint hardware / malicious software / board real estate / purpose hardware / software vulnerability / malicious hardware / software stack / pure software / software environment / cryptographic hardware / is to overwrite existing network / malicious services / manufacturing / oil pipeline control software / in-between pure hardware / malicious processors / /

OperatingSystem

Linux / /

Organization

US embassy in Moscow / University of Illinois / Central Intelligence Agency / Department of Defense / IEEE Computer Society / /

Person

Joseph Tucek / Ed Nightingale / Samuel T. King / Landon Cox / Chris Grier / Milo Martin / Addison Wesley / Anthony Cozzie / Vikram Adve / Michael LeMay / Jonathan Smith / Frans Kaashoek / /

Position

driver / architect / Architecture Software Developer / designer / skillful malicious processor architect / production lead / malicious processor designer / King / /

Product

Leon3 processor / iPods / Leon3 / /

ProgrammingLanguage

SQL / DC / /

ProvinceOrState

Illinois / New York / Manitoba / /

PublishedMedium

The Washington Post / /

RadioStation

Core / /

Technology

Alpha / FPGA / open source SPARC processor / RAM / Linux / cache memory / random access / Leon3 processor / SRAM / operating system / UDP / malicious processors / Operating Systems / VHDL / integrated circuits / pdf / encryption / Ethernet / Leon3 synthesizable processor / modified Leon3 processor / simulation / baseline processor / /

URL

http /

SocialTag