Nähere Informationen zum EHAC-Projekt

Diese Seite listet verfügbare Veröffentlichungen und weitere Materialien, die detaillierte Informationen über das EHAC-Projekt bzw. über das im EHAC-Projekt behandelte Thema wiedergeben.
 

Begutachtete wissenschaftliche Publikation


Dissertation

  • -in Vorbereitung-

Technischer Bericht

  • Enhanced BARM — Authentic Reporting to External Platforms
    Patrick Stewin
    Technical Report: 2014-03, ISSN: 1436-9915, Technische Universität Berlin, Berlin, September 2014.
    Forschungsbericht
     

Abschlussbericht des EHAC-Projekts

  • -in Vorbereitung-

Verwandte Arbeiten vom Lehrstuhl für Security in Telecommunications (SecT)

  • Understanding DMA Malware
    Patrick Stewin and Iurii Bystrov
    DIMVA2012 Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Heraklion, Crete, Greece, July 26-27th, 2012
    Konferenzband
    Vortragsfolien
  • Poster: Towards Detecting DMA Malware
    Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner
    CCS '11 Proceedings of the 18th ACM conference on Computer and communications security, 2011
    Konferenzband
    Poster
  • In God We Trust All Others We Monitor
    Patrick Stewin, Jean-Pierre Seifert
    CCS '10 Proceedings of the 17th ACM conference on Computer and communications security, 2010
    Konferenzband
    Poster

Weitere verwandte Materialien vom Lehrstuhl für Security in Telecommunications (SecT)


Weitere verwandte Arbeiten zum Thema

  • TRESOR-HUNT: Attacking CPU-bound Encryption
    Erik-Oliver Blass and William Robertson
    In Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, 2012
    Konferenzband
  • What If You Can't Trust Your Network Card?
    Loic Duflot, Yves-Alexis Perez, and Benjamin Morin
    In Proceedings of the 2011 International Symposium on Research in Attacks, Intrusions and Defenses (RAID), California, USA, September 20-21, 2011
    Konferenzband
  • How to Develop a Rootkit for Broadcom NetExtreme Network Cards
    Guillaume Delugre
    RECON 2011, Montreal, Canada, July 8-10, 2011
    Vortragsfolien
  • Run-time Firmware Integrity Verication: What If You Can't Trust Your Network Card?
    Loic Duflot, Yves-Alexis Perez, and Benjamin Morin
    CanSecWest 2011, Vancouver, Canada, March 9-11, 2011
    Vortragsfolien
  • Closer to Metal: Reverse Engineering the Broadcom NetExtreme's Firmware
    Guillaume Delugre
    Hack.lu 2010, Luxembourg, October 27-29, 2010
    Vortragsfolien
  • Subverting Windows 7 x64 Kernel with DMA Attacks
    Damien Aumaitre and Christophe Devine
    Hack in the Box, Amsterdam, June 29-July 2, 2010
    Vortragsfolien
  • Can You Still Trust Your Network Card?
    Loic Duflot, Yves-Alexis Perez, Guillaume Valadon, and Olivier Levillain
    CanSecWest 2010, Vancouver, Canada, March 24-26, 2010
    Vortragsfolien
  • The Jedi Packet Trick Takes Over the Deathstar
    Arrigo Triulzi
    CanSecWest 2010, Vancouver, Canada, March 24-26, 2010
    Vortragsfolien
  • Introducing Ring -3 Rootkits
    Alexander Tereshkin and Rafal Wojtczuk
    Black Hat 2009, Las Vegas, USA, July 25-30, 2009
    Vortragsfolien
  • Project Maux Mk.II
    Arrigo Triulzi
    PacSec 2008, Tokyo, Japan, November 12-13, 2008
    Vortragsfolien
 
01IS12056




Security in Telecommunications / Technische Universität Berlin.
Alle Webseiteninhalte © 2013 -- 2014, FG Security in Telecommunications.