Home > Articles > Security > Network Security

  • Print
  • + Share This

References

[1]

J. Grand (Editor), et al., Hardware Hacking: Have Fun While Voiding Your Warranty, Syngress Publishing, 2004.

[2]

S.H. Weingart, "Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses,'' Workshop on Cryptographic Hardware and Embedded Systems, 2000.

[3]

R.G. Johnston and A.R.E. Garcia, "Vulnerability Assessment of Security Seals," Journal of Security Administration, 1997.

[4]

D. Chaum, "Design Concepts for Tamper Responding Systems,'' Advances in Cryptology: Proceedings of Crypto '83.

[5]

P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," Sixth USENIX Security Symposium, 1996.

[6]

P. Gutmann, "Data Remanence in Semiconductor Devices," Tenth USENIX Security Symposium, 2001.

[7]

S. Skorobogatov, "Low Temperature Data Remanence in Static RAM," University of Cambridge Computer Laboratory Technical Report UCAM-CL-TR-536, June 2002.

[8]

National Institute of Standards and Technology, "Security Requirements for Cryptographic Modules," FIPS Publication 140-2.

[9]

xda-developers.com, JTAG for the XDA.

[10]

J. Grand, "Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats," Tenth USENIX Security Symposium, 2001.

[11]

J. Young, TEMPEST Documents.

[12]

W. van Eck, "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" Computers and Security, 1985.

[13]

M.G. Kuhn and R.J. Anderson, "Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations," Information Hiding, 1998.

[14]

J. Loughry and D.A. Umphress, "Information Leakage from Optical Emanations," ACM Transactions on Information and System Security, 2002.

[15]

J.R. Rao and P. Rohatgi, "EMPowering Side-Channel Attacks," IBM Research Center.


  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.