References
[1] |
J. Grand (Editor), et al., Hardware Hacking: Have Fun While Voiding Your Warranty, Syngress Publishing, 2004. |
[2] |
S.H. Weingart, "Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses,'' Workshop on Cryptographic Hardware and Embedded Systems, 2000. |
[3] |
R.G. Johnston and A.R.E. Garcia, "Vulnerability Assessment of Security Seals," Journal of Security Administration, 1997. |
[4] |
D. Chaum, "Design Concepts for Tamper Responding Systems,'' Advances in Cryptology: Proceedings of Crypto '83. |
[5] |
P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," Sixth USENIX Security Symposium, 1996. |
[6] |
P. Gutmann, "Data Remanence in Semiconductor Devices," Tenth USENIX Security Symposium, 2001. |
[7] |
S. Skorobogatov, "Low Temperature Data Remanence in Static RAM," University of Cambridge Computer Laboratory Technical Report UCAM-CL-TR-536, June 2002. |
[8] |
National Institute of Standards and Technology, "Security Requirements for Cryptographic Modules," FIPS Publication 140-2. |
[9] |
xda-developers.com, JTAG for the XDA. |
[10] |
J. Grand, "Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats," Tenth USENIX Security Symposium, 2001. |
[11] |
J. Young, TEMPEST Documents. |
[12] |
W. van Eck, "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" Computers and Security, 1985. |
[13] |
M.G. Kuhn and R.J. Anderson, "Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations," Information Hiding, 1998. |
[14] |
J. Loughry and D.A. Umphress, "Information Leakage from Optical Emanations," ACM Transactions on Information and System Security, 2002. |
[15] |
J.R. Rao and P. Rohatgi, "EMPowering Side-Channel Attacks," IBM Research Center. |