, An attempt to backdoor the kernel, 2003.
, From China with Love, 2013.
, How a Crypto 'Backdoor' Pitted the Tech World Against the NSA, 2013.
, Multiple Vulnerabilities in D-Link DIR-600 and DIR-300 (rev B), 2013.
, TCP-32764 Backdoor, 2013.
, Why everyone is left less secure when the NSA doesn't help fix security flaws, 2013.
, Inside the EquationDrug Espionage Platform, 2015.
, , 2016.
, Backdoor in Sony IPELA Engine IP Cameras, 2016.
, Multiple vulnerabilities found in Quanta LTE routers, 2016.
, Hacking the Western Digital MyClound NAS, 2017.
Instruction-Level Steganography for Covert TriggerBased Malware, 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2014. ,
DOI : 10.1007/978-3-319-08509-8_3
Weird machines, exploitability, and provable unexploitability, IEEE Transactions on Emerging Topics in Computing, 2017. ,
DOI : 10.1109/tetc.2017.2785299
URL : https://doi.org/10.1109/tetc.2017.2785299
Exploiting the Hard-working DWARF: Trojan and Exploit Techniques with No Native Executable Code, 5th USENIX Conference on Offensive Technologies, 2011. ,
Towards Reducing the Attack Surface of Software Backdoors, ACM SIGSAC conference on Computer & Communications Security, 2013. ,
Weird Machines, ELF: A Spotlight on the Underappreciated Metadata. 7th USENIX Conference on Offensive Technologies, 2013. ,
FirmaliceAutomatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware, Network and Distributed System Security Symposium, 2015. ,
Interrupt-oriented Bugdoor Programming: A Minimalist Approach to Bugdooring Embedded Systems Firmware, 30th Annual Computer Security Applications Conference, 2014. ,
DOI : 10.1145/2664243.2664268
, Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality. 22nd European Symposium on Research in Computer Security, 2017.
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware, 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2017. ,
Static Detection of Application Backdoors, 2007. ,
DOI : 10.1007/s11623-010-0024-4
Implementation and Implications of a Stealth Harddrive Backdoor, 29th Annual Computer Security Applications Conference, 2013. ,
DOI : 10.1145/2523649.2523661
URL : https://hal.archives-ouvertes.fr/hal-00869263
, Detecting Backdoors. 9th USENIX Conference on Security Symposium, 2000.