Tags: hardware*

41 bookmark(s) - Sort by: Date ↓ / Title /

  1. Tags: , , , , by Benjamin Schweizer (2009-02-03)
  2. Tags: , , by Andreas Turtschan (2008-10-19)
  3. cheap omap-board.
    Tags: , , by Andreas Turtschan (2008-08-22)
  4. Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and straightforward defenses. More complex designs that attack the software are unexplored, as are the countermeasures an attacker may take to bypass proposed defenses. (via fefe)
  5. Tags: , , , by Andreas Turtschan (2008-04-11)
  6. Tags: , , by Benjamin Schweizer (2008-01-07)

Top of the page

First / Previous / Next / Last / Page 2 of 5 Bookmarks: tagged with "hardware"

About - Propulsed by SemanticScuttle