Computer security compromised by hardware failure: Difference between revisions

Content deleted Content added
m Typo fixing, replaced: an other → another, typo(s) fixed: close-by → close by (2), screen’s → screen's (7)
Rescuing 3 sources and tagging 0 as dead. #IABot (v2.0beta15)
Line 211:
 
=== Chemical ===
* {{Citation | last1 = Gutmann | first1 = Peter | title = Data Remanence in Semiconductor Devices | volume = 10 | pages = 4 | periodical = Proceedings of the 10th Conference on USENIX Security Symposium SSYM'01 | publisher = USENIX Association Berkeley, California, USA | url = http://www.cypherpunks.to/~peter/usenix01.pdf | year = 2001 | ref = Gut1 | access-date = 2010-12-13 | archive-url = https://web.archive.org/web/20070221201213/http://www.cypherpunks.to/~peter/usenix01.pdf | archive-date = 2007-02-21 | dead-url = yes }}
 
=== Electromagnetic ===
Line 222:
=== FireWire ===
* {{Citation| last1 = Dornseif | first1 = Maximillian | title = 0wned by an iPod | pages = | periodical = PacSec | place = | url = http://pi1.informatik.uni-mannheim.de/filepool/publications/13.pdf | year = 2004 | doi = | isbn = | ref = Dorn1 }}
* {{Citation | last1 = Dornseif | first1 = Maximillian | title = FireWire all your memory are belong to us | pages = | periodical = CanSecWest | place = | url = http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf | year = 2005 | doi = | isbn = | ref = Dorn2 | access-date = 2010-12-17 | archive-url = https://web.archive.org/web/20091229032404/http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf | archive-date = 2009-12-29 | dead-url = yes }}
 
=== Processor bug and backdoors ===
* {{cite book| last1 = Duflot | first1 = Loïc | title = Computer Security - ESORICS 2008 | volume = 5283| pages = 580–599 | periodical = ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security | ___location = | chapter-url = http://www.springerlink.com/index/jp07870p24560678.pdf | year = 2008 | issn = | doi = 10.1007/978-3-540-88313-5_37 | isbn = 978-3-540-88312-8 | accessdate = | ref = Dufl2| chapter = CPU Bugs, CPU Backdoors and Consequences on Security | series = Lecture Notes in Computer Science }}
* {{Citation | last1 = Duflot | first1 = Loïc | title = Using CPU System Management Mode to Circumvent Operating System Security Functions | volume = | pages = 580–599 | periodical = Proceedings of CanSecWest | ___location = | url = http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | year = 2008 | issn = | doi = | isbn = | accessdate = | ref = Dufl3 | archive-url = https://web.archive.org/web/20060526181027/http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | archive-date = 2006-05-26 | dead-url = yes }}
* {{Citation| last1 = Waksman | first1 = Adam | title = Tamper Evident Microprocessors | volume = | pages = | periodical = Proceedings of the IEEE Symposium on Security and Privacy | ___location = Oakland, California | url = http://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf | year = 2010 | issn = | doi = | isbn = | accessdate = | ref = Waks1}}