You might like
Recently I was researching about debug authentication of SWD/JTAG in LPC55S6x microcontroller and I wrote a tool to authenticate debug access in MCU using an open source hardware (Hydrabus)as a debugger. @hydrabus allows to analyze and access low level SWD github.com/parallelbeings…
Interesting bug in Google Pixel Titan M SE(AVRP - Wont Fix): Encrypting/Decrypting empty plain text in AES/CBC/NoPadding mode returns 300+ bytes of data from decrypt buffer. Initially Triaged Critical -> Later Wont Fix - POC with bug details below. github.com/parallelbeings…
github.com
GitHub - parallelbeings/Titan_m_aes_cbc_nopad_bug: Bug in AES CBC No padding mode retrieves 300...
Bug in AES CBC No padding mode retrieves 300 bytes of data from the secure element - parallelbeings/Titan_m_aes_cbc_nopad_bug
Today I am releasing a project I worked on the last months. If you want to learn about TrustZone-M on Arm, you should have a look: embeddedsecurity.io It's work in progress! Feedback is highly appreciated :) #arm #embedded #security #trustzone
I've read several misconceptions about Common Criteria certifications. Typically: - "Components producers pay for certification" - "Certifications test only against a known set of predefined scenarios" - "Certifications are not a replacement for independant review" Thread👇
Ever wondered about the security of your USB stack? We've explored it and found 10 CVEs on Linux and several crashes on Windows and MacOS with just a bit of fuzzing. Paper is ready, source will come at #SEC20: nebelwelt.net/publications/f… Comments welcome!
Power Side-channel Leakage Evaluation of a RISC-V Microprocessor youtu.be/C-R-gIGzLRA via @YouTube @ShaktiProcessor @vinod5976 @RahulAtTwitr @mdarsathiitm @iitmadras
youtube.com
YouTube
Power Side-channel Leakage Evaluation of a RISC-V Microprocessor
Write-up of Qualcomm USB driver vulnerability(CVE-2019-14079) I found using device fuzzing. Patched in March 2020 Android update. github.com/parallelbeings…
Want a chip imaged? My standard imaging policy is here: siliconpr0n.org/archive/doku.p…
Breaking STM32F1 firmware RDO protection : blog.zapb.de/stm32f1-except… Repo : gitlab.zapb.de/zapb/stm32f1-f…
CVE-2019-14079 Access to the uninitialized variable when the driver tries to unmap the dma buffer of a request which was never mapped in the first place leading to kernel failure in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdrago... cve.mitre.org/cgi-bin/cvenam…
My coworker just published a whitepaper that concisely summarizes the current state of the art techniques for bypassing readback protection in microcontrollers. Reverse engineer all the things! research.nccgroup.com/2020/02/20/whi…
Eclypsium just released its new research, "Perilous Peripherals." Millions of #Windows and #Linux systems still at risk due to firmware vulns in a variety of peripherals. Read about here: bit.ly/37Fu7n6. #firmware, #hack, #firmwaresecurity
Cyber week is starting soon with an amazing cyberweek.ae/competitions/d… pwn2own. Hackers gona Hack 🤳🏼👨🏼💻👩🏽💻
Linux directories cheat sheet.
Prof. Mark Tehranipoor, Director of FICS Research, is now recruiting PhD students interested in hardware security research. Please submit CVs and transcripts to [email protected].
Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers! leveldown.de/blog/svd-loade…
New video! I'm starting a series on the 6502: The classic microprocessor that started the personal computer revolution. Part one is out today: youtu.be/LnzuMJLZRdU
"Control-Flow Integrity for the Linux kernel: A Security Evaluation" is the work I've done for my Masters thesis where I analyze how the PaX Team's (public) RAP holds up to stop ROP when applied to the Linux kernel. You may want to check out chapter 3. alunos.dcc.fc.up.pt/~up201407890/T…
The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: limitedresults.com/2019/09/pwn-th… No way to fix it except hardware revision🥶. Stay tuned for the final act. #Esp32 #EspressifSystems
Part 2 is live!✨ Heap Overflows and the iOS Kernel Heap - Case Study from an in-the-wild iOS 0-Day. Learn how the exploit developer used a clever vulnerability-conversion to turn a heap-overflow into an artificial Use-After-Free. azeria-labs.com/heap-overflows…
United States Trends
- 1. Cunha 21.7K posts
- 2. Good Saturday 24.4K posts
- 3. Richarlison 5,026 posts
- 4. #SaturdayVibes 3,376 posts
- 5. Tottenham 57.9K posts
- 6. Lammens 8,350 posts
- 7. #TOTMUN 8,973 posts
- 8. #Caturday 3,515 posts
- 9. Dorgu 8,300 posts
- 10. Mbeumo 52.2K posts
- 11. Amad 13K posts
- 12. #MUFC 16.8K posts
- 13. Richy 3,215 posts
- 14. #saturdaymorning 1,921 posts
- 15. Mbuemo 5,587 posts
- 16. Thomas Frank 4,408 posts
- 17. Porro 4,893 posts
- 18. Manchester United 65.7K posts
- 19. LINGORM HER AND HERS FANCON 1.9M posts
- 20. Shauni Kerkhoff 28.3K posts
You might like
-
Almond OffSec
@AlmondOffSec -
hardwear.io
@hardwear_io -
Mr-IoT
@v33riot -
Ivan Kwiatkowski
@JusticeRage -
Grant H
@Digital_Cold -
ege
@egeblc -
Ashwin
@0xsilipwn -
Patrick Ventuzelo
@Pat_Ventuzelo -
sudi
@sudhanshur705 -
sw33tLie
@sw33tLie -
Martijn Bogaard
@jmartijnb -
j3ssie (Ai Ho)
@j3ssiejjj -
Akshansh Jaiswal
@Akshanshjaiswl -
Rado RC1
@RabbitPro -
Andrey Konovalov
@andreyknvl
Something went wrong.
Something went wrong.