Home > Articles > Security > Network Security

  • Print
  • + Share This



J. Grand (Editor), et al., Hardware Hacking: Have Fun While Voiding Your Warranty, Syngress Publishing, 2004.


S.H. Weingart, "Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses,'' Workshop on Cryptographic Hardware and Embedded Systems, 2000.


R.G. Johnston and A.R.E. Garcia, "Vulnerability Assessment of Security Seals," Journal of Security Administration, 1997.


D. Chaum, "Design Concepts for Tamper Responding Systems,'' Advances in Cryptology: Proceedings of Crypto '83.


P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," Sixth USENIX Security Symposium, 1996.


P. Gutmann, "Data Remanence in Semiconductor Devices," Tenth USENIX Security Symposium, 2001.


S. Skorobogatov, "Low Temperature Data Remanence in Static RAM," University of Cambridge Computer Laboratory Technical Report UCAM-CL-TR-536, June 2002.


National Institute of Standards and Technology, "Security Requirements for Cryptographic Modules," FIPS Publication 140-2.


xda-developers.com, JTAG for the XDA.


J. Grand, "Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats," Tenth USENIX Security Symposium, 2001.


J. Young, TEMPEST Documents.


W. van Eck, "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" Computers and Security, 1985.


M.G. Kuhn and R.J. Anderson, "Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations," Information Hiding, 1998.


J. Loughry and D.A. Umphress, "Information Leakage from Optical Emanations," ACM Transactions on Information and System Security, 2002.


J.R. Rao and P. Rohatgi, "EMPowering Side-Channel Attacks," IBM Research Center.

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.