Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,185 papers from all fields of science
Search
Sign In
Create Free Account
Backdoor (computing)
Known as:
W32/Induc-A
, Trusting trust
, Secure golden key
Expand
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
Android
Authentication
BitLocker
Expand
Broader (1)
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Towards Probabilistic Verification of Machine Unlearning
David M. Sommer
,
Liwei Song
,
Sameer Wagh
,
Prateek Mittal
arXiv.org
2020
Corpus ID: 212633829
Right to be forgotten, also known as the right to erasure, is the right of individuals to have their data erased from an entity…
Expand
Review
2017
Review
2017
How Much Do School Principals Matter When It Comes to Teacher Working Conditions?
Susan Burkhauser
2017
Corpus ID: 152230422
Teacher turnover is a challenge for U.S. public schools. Research suggests that teachers’ perceptions of their school working…
Expand
Review
2008
Review
2008
Immigration Policing Through the Backdoor: City Ordinances, the "right to the City," and the Exclusion of Undocumented Day Laborers
Monica W. Varsanyi
2008
Corpus ID: 44412742
Whereas the federal government has exclusive authority over immigration in the United States, during the past decade (and…
Expand
Highly Cited
2008
Highly Cited
2008
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Heng Yin
,
Zhenkai Liang
,
D. Song
Network and Distributed System Security Symposium
2008
Corpus ID: 3843752
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware…
Expand
Highly Cited
2008
Highly Cited
2008
Signature Generation and Detection of Malware Families
V. Sathyanarayan
,
P. Kohli
,
Bruhadeshwar Bezawada
Australasian Conference on Information Security…
2008
Corpus ID: 16564905
Malware detection and prevention is critical for the protection of computing systems across the Internet. The problem in…
Expand
Review
2007
Review
2007
A phylogenetic analysis of the arachnid orders based on morphological characters
J. Shultz
2007
Corpus ID: 17383846
Morphological evidence for resolving relationships among arachnid orders was surveyed and assembled in a matrix comprising 59…
Expand
Highly Cited
2007
Highly Cited
2007
A face with a cue: exploring the inevitability of person categorization
Douglas Martin
,
C. Macrae
2007
Corpus ID: 55046750
Recent research has explored the dynamics of categorical thinking, with debate centering on the putative automaticity of this…
Expand
Highly Cited
2001
Highly Cited
2001
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
Sung-Ming Yen
,
Seungjoo Kim
,
Seongan Lim
,
S. Moon
International Conference on Information Security…
2001
Corpus ID: 27236440
Recently, many research works have been reported about how physical cryptanalysis can be carried out on cryptographic devices by…
Expand
Highly Cited
1991
Highly Cited
1991
Backdoor to Eugenics
N. Holtzman
1991
Corpus ID: 71400757
The presented book we offer here is not kind of usual book. You know, reading now doesn't mean to handle the printed book in your…
Expand
Highly Cited
1989
Highly Cited
1989
Echoes of Scripture in the letters of Paul
R. Hays
1989
Corpus ID: 160360523
Paul's letters, the earliest writings in the New Testament, are filled with allusions, images and quotations from the Old…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE