Detection of malicious logic on a hardware device is difficult to detect. This thesis proposes a device driver that emulates a hardware device and that device’s software driver. This device driver attacks the target system by accessing the hard disk in order to perform read and write transactions without the knowledge of the operating system or intrusion detection/prevention software. The attacks performed by the driver compromise the confidentiality, integrity, and availability of data on the target system’s disk drive. The attacks performed by the device driver have a less than one percent impact on system performance. This thesis, while tested in a Windows environment, applies to other operating systems (such as Linux/Unix, etc.) and thu...
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSL...
Hardware security and hardware authentication have become more and more important concerns in the ma...
Developers and technologists of enterprise systems such as servers, storage and networking products ...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
The Android operating system is quickly becoming the most popular platform for mobiledevices. As And...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
Arada Locomate On-Board Unit is a vehicle-to-vehicle communication device that supports the WAVE pro...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
Standard procedures used by law enforcement for evidence preservation require removing power from th...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
With networks expanding into all areas of business, both network and security engineers are finding ...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (I...
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSL...
Hardware security and hardware authentication have become more and more important concerns in the ma...
Developers and technologists of enterprise systems such as servers, storage and networking products ...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
The Android operating system is quickly becoming the most popular platform for mobiledevices. As And...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
Arada Locomate On-Board Unit is a vehicle-to-vehicle communication device that supports the WAVE pro...
Malware or malicious code is design to gather sensitive information without knowledge or permission ...
Standard procedures used by law enforcement for evidence preservation require removing power from th...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
With networks expanding into all areas of business, both network and security engineers are finding ...
Denial-of-Service (DoS) attacks are aimed at shutting a machine or network down to block users from ...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (I...
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSL...
Hardware security and hardware authentication have become more and more important concerns in the ma...
Developers and technologists of enterprise systems such as servers, storage and networking products ...