Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,121,386 papers from all fields of science
Search
Sign In
Create Free Account
Backdoor (computing)
Known as:
W32/Induc-A
, Trusting trust
, Secure golden key
Expand
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
Android
Authentication
BitLocker
Expand
Broader (1)
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Structural sparseness and complex networks
F. Reidl
2016
Corpus ID: 39368113
The field of complex networks has seen a steady growth in the last decade, fuelled by an ever-growing collection of relational…
Expand
2014
2014
Identifying back doors, attack points, and surveillance mechanisms in iOS devices
Jonathan Zdziarski
Digital Investigation. The International Journal…
2014
Corpus ID: 17128918
2007
2007
Covert computer and network communications
R. Newman
Annual Conference on Information Security…
2007
Corpus ID: 23411397
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for…
Expand
Highly Cited
2006
Highly Cited
2006
Malware prevalence in the KaZaA file-sharing network
Seungwon Shin
,
Jaeyeon Jung
,
H. Balakrishnan
ACM/SIGCOMM Internet Measurement Conference
2006
Corpus ID: 2976102
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation…
Expand
Highly Cited
2005
Highly Cited
2005
Towards protecting sensitive files in a compromised system
Xin Zhao
,
Kevin Borders
,
A. Prakash
IEEE Security in Storage Workshop
2005
Corpus ID: 11293753
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and…
Expand
2005
2005
Guestworkers and Exploitation
R. Mayer
The Review of Politics
2005
Corpus ID: 143561534
Are guestworker programs exploitative? Egalitarian and neoclassical theories of exploitation agree that they always are. But…
Expand
Highly Cited
2003
Highly Cited
2003
MECA: an extensible, expressive system and language for statically checking security properties
Junfeng Yang
,
Theodore Kremenek
,
Yichen Xie
,
D. Engler
Conference on Computer and Communications…
2003
Corpus ID: 252049
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for…
Expand
1992
1992
Anthropogenic Influence on the 14C Activity and Other Constituents of Recent Lake Sediments: A Case Study1
D. Srdoč
,
N. Horvatinčič
,
+7 authors
Anđelka Plenković-Moraj
Radiocarbon: An International Journal of…
1992
Corpus ID: 55656515
Anthropogenic activities that introduce an excess of nutrients and other pollutants into rivers and lakes are causing significant…
Expand
1990
1990
Wolf effect in homogeneous and inhomogeneous media
Avshalom Gamliel
,
G. Agrawal
1990
Corpus ID: 31575264
We derive expressions for the spectrum of the field produced by planar, secondary Gaussian Schell-model sources after propagation…
Expand
1984
1984
Swapping recipes for control.
J. Weisz
,
Fred Rothbaum
,
Thomas C. Blackburn
1984
Corpus ID: 145660170
The comments by Azuma and Kojima are both encouraging and thought provoking. We thoroughly agree that there may be multiple…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required