, An attempt to backdoor the kernel, 2003.

, From China with Love, 2013.

, How a Crypto 'Backdoor' Pitted the Tech World Against the NSA, 2013.

, Multiple Vulnerabilities in D-Link DIR-600 and DIR-300 (rev B), 2013.

, TCP-32764 Backdoor, 2013.

, Why everyone is left less secure when the NSA doesn't help fix security flaws, 2013.

, Inside the EquationDrug Espionage Platform, 2015.

A. Backdoor, , 2016.

, Backdoor in Sony IPELA Engine IP Cameras, 2016.

, Multiple vulnerabilities found in Quanta LTE routers, 2016.

, Hacking the Western Digital MyClound NAS, 2017.

D. Andriesse and H. Bos, Instruction-Level Steganography for Covert TriggerBased Malware, 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2014.
DOI : 10.1007/978-3-319-08509-8_3

T. F. Dullien, Weird machines, exploitability, and provable unexploitability, IEEE Transactions on Emerging Topics in Computing, 2017.
DOI : 10.1109/tetc.2017.2785299

URL : https://doi.org/10.1109/tetc.2017.2785299

J. Oakley and S. Bratus, Exploiting the Hard-working DWARF: Trojan and Exploit Techniques with No Native Executable Code, 5th USENIX Conference on Offensive Technologies, 2011.

F. Schuster and T. Holz, Towards Reducing the Attack Surface of Software Backdoors, ACM SIGSAC conference on Computer & Communications Security, 2013.

R. Shapiro, S. Bratus, and S. W. Smith, Weird Machines, ELF: A Spotlight on the Underappreciated Metadata. 7th USENIX Conference on Offensive Technologies, 2013.

Y. Shoshitaishvili, R. Wang, C. Hauser, C. Kruegel, and G. Vigna, FirmaliceAutomatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware, Network and Distributed System Security Symposium, 2015.

S. J. Tan, S. Bratus, and T. Goodspeed, Interrupt-oriented Bugdoor Programming: A Minimalist Approach to Bugdooring Embedded Systems Firmware, 30th Annual Computer Security Applications Conference, 2014.
DOI : 10.1145/2664243.2664268

S. L. Thomas, T. Chothia, F. D. Garcia, and . Stringer, Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality. 22nd European Symposium on Research in Computer Security, 2017.

S. L. Thomas, F. D. Garcia, and T. Chothia, HumIDIFy: A Tool for Hidden Functionality Detection in Firmware, 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2017.

C. Wysopal and C. Eng, Static Detection of Application Backdoors, 2007.
DOI : 10.1007/s11623-010-0024-4

J. Zaddach, A. Kurmus, D. Balzarotti, E. Blass, A. Francillon et al., Implementation and Implications of a Stealth Harddrive Backdoor, 29th Annual Computer Security Applications Conference, 2013.
DOI : 10.1145/2523649.2523661

URL : https://hal.archives-ouvertes.fr/hal-00869263

Y. Zhang and V. Paxson, Detecting Backdoors. 9th USENIX Conference on Security Symposium, 2000.