Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,982,329 papers from all fields of science
Search
Sign In
Create Free Account
Backdoor (computing)
Known as:
W32/Induc-A
, Trusting trust
, Secure golden key
Expand
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
Android
Authentication
BitLocker
Expand
Broader (1)
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Exploring Backdoor Poisoning Attacks Against Malware Classifiers
Giorgio Severi
,
J. Meyer
,
Scott E. Coull
,
Alina Oprea
arXiv.org
2020
Corpus ID: 211677512
Current training pipelines for machine learning (ML) based malware classification rely on crowdsourced threat feeds, exposing a…
Expand
2016
2016
Information Hiding in the Public RSA Modulus
S. Wüller
,
Marián Kühnel
,
Ulrike Meyer
2016
Corpus ID: 41816162
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way…
Expand
Review
2014
Review
2014
COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY
P. Bali
2014
Corpus ID: 62089687
Internet has revolutionized many aspects of our daily lives. Nowadays Internet is used for millions of applications. Many people…
Expand
2011
2011
Cromwell's Edinburgh Press and the Development of Print Culture in Scotland
R. Spurlock
2011
Corpus ID: 162722762
Alasdair Mann, the noted scholar of book culture in early modern Scotland, has suggested that a significant change had occurred…
Expand
2011
2011
Security Analysis of TrueCrypt 7 . 0 a with an Attack on the Keyfile Algorithm
2011
Corpus ID: 16033543
Preface…
Expand
Highly Cited
2006
Highly Cited
2006
Malware prevalence in the KaZaA file-sharing network
Seungwon Shin
,
Jaeyeon Jung
,
H. Balakrishnan
ACM/SIGCOMM Internet Measurement Conference
2006
Corpus ID: 2976102
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation…
Expand
2006
2006
Efficient Sampling of the Structure of Cryptographic Generators ’ State Transition Graphs
J. Keller
2006
Corpus ID: 54985936
Cryptographic generators like the A5/1 are finite state machines with deterministic transition functions. Their state transition…
Expand
Highly Cited
2005
Highly Cited
2005
Towards protecting sensitive files in a compromised system
Xin Zhao
,
Kevin Borders
,
A. Prakash
IEEE Security in Storage Workshop
2005
Corpus ID: 11293753
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and…
Expand
1974
1974
Children's Discrimination of English Spelling Patterns with Redundant Auditory Information.
R. Golinkoff
1974
Corpus ID: 115134627
The purpose of this experiment was to present redundant auditory information along with written displays to see if first graders…
Expand
1968
1968
Through the back door
R. Marett
1968
Corpus ID: 158495947