Computer security compromised by hardware failure: Difference between revisions

Content deleted Content added
Monkbot (talk | contribs)
m Task 16: replaced (4×) / removed (0×) deprecated |dead-url= and |deadurl= with |url-status=;
GreenC bot (talk | contribs)
Move 2 urls. Wayback Medic 2.5
Line 214:
 
=== Electromagnetic ===
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Information Hiding | volume = 1525 | last2 = Anderson | first2 = Ross J. | pages = 124–142 | periodical = Lecture Notes in Computer Science | chapter-url = http://www.springerlink.com/content/dm6kgf2p4mnrp0uv/ | year = 1998 | doi = 10.1007/3-540-49380-8_10 | isbn = 978-3-540-65386-8 | ref = Kuhn1| chapter = Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations | series = Lecture Notes in Computer Science | citeseerx = 10.1.1.64.6982 }}
* {{Citation| last1 = Van Eck | first1 = Wim | last2 = Laborato | first2 = Neher | title = Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? | volume = 4 | issue = 4 | pages = 269–286 | periodical = Computers & Security | url = http://portal.acm.org/citation.cfm?id=7308 | year = 1985 | doi = 10.1016/0167-4048(85)90046-X | isbn = | ref = Eck1 | citeseerx = 10.1.1.35.1695 }}
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3– | periodical = Proceedings of the 2002 IEEE Symposium on Security and Privacy |chapter-url=http://portal.acm.org/citation.cfm?id=829514.830537 | year = 2002 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 978-0-7695-1543-4 | ref = Kuhn2| chapter = Optical time-___domain eavesdropping risks of CRT displays | citeseerx = 10.1.1.7.5870 }}
Line 225:
 
=== Processor bug and backdoors ===
* {{cite book| last1 = Duflot | first1 = Loïc | title = Computer Security - ESORICS 2008 | volume = 5283| pages = 580–599 | periodical = ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security | ___location = | chapter-url = http://www.springerlink.com/index/jp07870p24560678.pdf | year = 2008 | issn = | doi = 10.1007/978-3-540-88313-5_37 | isbn = 978-3-540-88312-8 | accessdate = | ref = Dufl2| chapter = CPU Bugs, CPU Backdoors and Consequences on Security | series = Lecture Notes in Computer Science }}
* {{Citation | last1 = Duflot | first1 = Loïc | title = Using CPU System Management Mode to Circumvent Operating System Security Functions | pages = 580–599 | periodical = Proceedings of CanSecWest | url = http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | year = 2008 | ref = Dufl3 | archive-url = https://web.archive.org/web/20060526181027/http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | archive-date = 2006-05-26 | url-status = dead }}
* {{Citation| last1 = Waksman | first1 = Adam | title = Tamper Evident Microprocessors | volume = | pages = | periodical = Proceedings of the IEEE Symposium on Security and Privacy | ___location = Oakland, California | url = https://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf | year = 2010 | issn = | doi = | isbn = | accessdate = | ref = Waks1}}