Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,650 papers from all fields of science
Search
Sign In
Create Free Account
Backdoor (computing)
Known as:
W32/Induc-A
, Trusting trust
, Secure golden key
Expand
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
Android
Authentication
BitLocker
Expand
Broader (1)
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Exploring Backdoor Poisoning Attacks Against Malware Classifiers
Giorgio Severi
,
J. Meyer
,
Scott E. Coull
,
Alina Oprea
arXiv.org
2020
Corpus ID: 211677512
Current training pipelines for machine learning (ML) based malware classification rely on crowdsourced threat feeds, exposing a…
Expand
2016
2016
Information Hiding in the Public RSA Modulus
S. Wüller
,
Marián Kühnel
,
Ulrike Meyer
2016
Corpus ID: 41816162
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way…
Expand
2011
2011
Cromwell's Edinburgh Press and the Development of Print Culture in Scotland
R. Spurlock
2011
Corpus ID: 162722762
Alasdair Mann, the noted scholar of book culture in early modern Scotland, has suggested that a significant change had occurred…
Expand
2011
2011
Security Analysis of TrueCrypt 7 . 0 a with an Attack on the Keyfile Algorithm
2011
Corpus ID: 16033543
Preface…
Expand
Highly Cited
2006
Highly Cited
2006
Malware prevalence in the KaZaA file-sharing network
Seungwon Shin
,
Jaeyeon Jung
,
H. Balakrishnan
ACM/SIGCOMM Internet Measurement Conference
2006
Corpus ID: 2976102
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation…
Expand
2006
2006
Efficient Sampling of the Structure of Cryptographic Generators ’ State Transition Graphs
J. Keller
2006
Corpus ID: 54985936
Cryptographic generators like the A5/1 are finite state machines with deterministic transition functions. Their state transition…
Expand
Highly Cited
2005
Highly Cited
2005
Towards protecting sensitive files in a compromised system
Xin Zhao
,
Kevin Borders
,
A. Prakash
IEEE Security in Storage Workshop
2005
Corpus ID: 11293753
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and…
Expand
2004
2004
Electronic Voting Systems Is Brazil ahead of its time
Pedro A. D. Rezende
2004
Corpus ID: 14897796
In May 2001, from the losing end of a fierce internal power dispute, the president of the Brazilian Senate publicly admitted to…
Expand
1974
1974
Children's Discrimination of English Spelling Patterns with Redundant Auditory Information.
R. Golinkoff
1974
Corpus ID: 115134627
The purpose of this experiment was to present redundant auditory information along with written displays to see if first graders…
Expand
1968
1968
Through the back door
R. Marett
1968
Corpus ID: 158495947
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE