Loading...
Search for: backdoor
0.004 seconds

    Router Backdoor Insertion and Assessment

    , M.Sc. Thesis Sharif University of Technology Kazemi Khaneghah, Soheil (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    With the expansion of network equipment including routers and wireless modems, these equipment have become more susceptible to backdoors and hacker attacks. One way to cause troubles to these systems is through backdoor insertion. Recently, several attacks via backdoor insertions have been reported by some of the major router companies. In this project, a complete description of routers, ways of intrusion to routers and how to change settings in routers in order to measure traffic intensity are explained. In this thesis we manually setup a backdoor in a router in order to observe its effects on local networks. Furthermore, we purposely attack a router in order to find the followings: 1. Ways... 

    Designing and Evaluation of Hardware Backdoors In a Typical Processor

    , M.Sc. Thesis Sharif University of Technology Asadi, Mohammad Reza (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Recently, security of integrated circuits has received more attention as ICs have become more complex and their usage has increased in safety critical systems. Many orgeniaztions use the ICs that made by third party companies. This is due to the high costs to build and maintain state-of-the-art semiconductor factories. This subject puts the trustworthiness of the ICs under the question. The chips might be maliciously modified in each stage of the manufacturing chain. This threat is called hardware backdoor in scientific community. The aim of this project is to assess the features embedded in a microprocessor and evaluate the side channel effect of various hardware backdoors. hardware... 

    Detection and Implementation of Hardware Backdoor in Programmable Logic Controller

    , M.Sc. Thesis Sharif University of Technology Babaei Moghaddam, Ahmad (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Nowadays, extensive use of Hardware Trojan Horses (HTH) or backdoors is more prevalent than ever. We could count disruption, disabling, eavesdropping and sending out internal information as misuse.
    In this project, we embed hardware trojan in a Programmable Logic Controller, and present different methods to detect and neutralize them. This is an important issue, as PLCs should work in a safe environment especially in industrial environments while keeping the information intact is significant as even a slight intentional malfunction could cause data to be lost or disclosed, and result in a catastrophe. Subsequently, features of hardware of PLCs should be examined and the right place of... 

    Embedded System Vulnerability Analysis Approach Based on Firmware Modification Attacks in Industrial Control Systems

    , M.Sc. Thesis Sharif University of Technology Pour Vali Moghadam, Hamed (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    A wide range of field devices, including Intelligent Electronic Devices (IEDs) and Remote Terminal Units (RTUs), are used in Industrial Control Systems (ICSs). These devices are embedded systems that are responsible for protecting the power system devices against faults and damage by controlling circuit breakers. Disruptions in command and control can result in accidents and harm. Due to their physical accessibility and the possibility of backdoors, blackout attacks may be designed and implemented on these devices in a manner similar to what has occurred in many countries in recent year.Many vulnerabilities have been reported for Real-Time Operating System (RTOS), firmware, and software of...