2022
DOI: 10.1365/s43439-021-00043-6
|View full text |Cite|
|
Sign up to set email alerts
|

Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…The trojan mimicks natural SolarWinds API communication, which then enables it to connect to a domain that is controlled by the adversary, a so called command and control domain (C2). The trojan then tries to determine which security software resides on the hardware it is currently placed in, which it does locally and with great efficiency 8 . Even if it finds any of these, it will not exit because of it, instead checking for whether they are active, and whenever they are not, the trojan will disable the security software on the next power cycle in the Windows registry which it creates access to.…”
Section: Sunburst Backdoormentioning
confidence: 99%
See 2 more Smart Citations
“…The trojan mimicks natural SolarWinds API communication, which then enables it to connect to a domain that is controlled by the adversary, a so called command and control domain (C2). The trojan then tries to determine which security software resides on the hardware it is currently placed in, which it does locally and with great efficiency 8 . Even if it finds any of these, it will not exit because of it, instead checking for whether they are active, and whenever they are not, the trojan will disable the security software on the next power cycle in the Windows registry which it creates access to.…”
Section: Sunburst Backdoormentioning
confidence: 99%
“…This act deserves its own paper for further security analysis, but it is relevant to discuss which influence it has the practical and real measures to mitigate Supply Chain Attacks 17. Regulation 2019/88118 See additional analysis by[23,8] 19. See Art 3 and 4 of the Act 20.…”
mentioning
confidence: 99%
See 1 more Smart Citation