Analysis of Trojan-Horse Attack against Untrusted Source
نویسندگان
چکیده
منابع مشابه
Protecting Java Component Integrity Against Trojan Horse Programs
We discuss how integrity of components of Java applications can be protected. Intrinsic and extrinsic protection mechanisms are employed. Capabilities of the Java application programming interface include permissions and signed JAR files. The strength of the methods depends on the operating system in which the Java virtual machine is embedded. Possible attacks by Trojan horse programs on compon...
متن کاملELT: A Trojan Horse in Disguise?
Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...
متن کاملTheory of the Trojan-Horse Method
The Trojan-Horse method is an indirect approach to determine the energy dependence of S factors of astrophysically relevant two-body reactions. This is accomplished by studying closely related three-body reactions under quasi-free scattering conditions. The basic theory of the Trojan-Horse method is developed starting from a post-form distorted wave Born approximation of the T-matrix element. I...
متن کاملAn intestinal Trojan horse for gene delivery.
The intestinal epithelium forms an essential element of the mucosal barrier and plays a critical role in the pathophysiological response to different enteric disorders and diseases. As a major enteric dysfunction of the intestinal tract, inflammatory bowel disease is a genetic disease which results from the inappropriate and exaggerated mucosal immune response to the normal constituents in the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Application
سال: 2018
ISSN: 2161-8801,2161-881X
DOI: 10.12677/csa.2018.81009