Skip to search formSkip to main contentSkip to account menu

Backdoor (computing)

Known as: W32/Induc-A, Trusting trust, Secure golden key 
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Current training pipelines for machine learning (ML) based malware classification rely on crowdsourced threat feeds, exposing a… 
2016
2016
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way… 
2011
2011
Alasdair Mann, the noted scholar of book culture in early modern Scotland, has suggested that a significant change had occurred… 
Highly Cited
2006
Highly Cited
2006
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation… 
2006
2006
Cryptographic generators like the A5/1 are finite state machines with deterministic transition functions. Their state transition… 
Highly Cited
2005
Highly Cited
2005
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and… 
2004
2004
In May 2001, from the losing end of a fierce internal power dispute, the president of the Brazilian Senate publicly admitted to… 
1974
1974
The purpose of this experiment was to present redundant auditory information along with written displays to see if first graders… 
1968
1968