parallel_beings's profile picture.

RootFTrust

@parallel_beings

Recently I was researching about debug authentication of SWD/JTAG in LPC55S6x microcontroller and I wrote a tool to authenticate debug access in MCU using an open source hardware (Hydrabus)as a debugger. @hydrabus allows to analyze and access low level SWD github.com/parallelbeings…


Interesting bug in Google Pixel Titan M SE(AVRP - Wont Fix): Encrypting/Decrypting empty plain text in AES/CBC/NoPadding mode returns 300+ bytes of data from decrypt buffer. Initially Triaged Critical -> Later Wont Fix - POC with bug details below. github.com/parallelbeings…

github.com

GitHub - parallelbeings/Titan_m_aes_cbc_nopad_bug: Bug in AES CBC No padding mode retrieves 300...

Bug in AES CBC No padding mode retrieves 300 bytes of data from the secure element - parallelbeings/Titan_m_aes_cbc_nopad_bug


RootFTrust reposted

Today I am releasing a project I worked on the last months. If you want to learn about TrustZone-M on Arm, you should have a look: embeddedsecurity.io It's work in progress! Feedback is highly appreciated :) #arm #embedded #security #trustzone


RootFTrust reposted

I've read several misconceptions about Common Criteria certifications. Typically: - "Components producers pay for certification" - "Certifications test only against a known set of predefined scenarios" - "Certifications are not a replacement for independant review" Thread👇


RootFTrust reposted

Ever wondered about the security of your USB stack? We've explored it and found 10 CVEs on Linux and several crashes on Windows and MacOS with just a bit of fuzzing. Paper is ready, source will come at #SEC20: nebelwelt.net/publications/f… Comments welcome!

gannimo's tweet image. Ever wondered about the security of your USB stack? We've explored it and found 10 CVEs on Linux and several crashes on Windows and MacOS with just a bit of fuzzing. Paper is ready, source will come at #SEC20: nebelwelt.net/publications/f… Comments welcome!

Write-up of Qualcomm USB driver vulnerability(CVE-2019-14079) I found using device fuzzing. Patched in March 2020 Android update. github.com/parallelbeings…


RootFTrust reposted

Want a chip imaged? My standard imaging policy is here: siliconpr0n.org/archive/doku.p…

johndmcmaster's tweet image. Want a chip imaged? My standard imaging policy is here: siliconpr0n.org/archive/doku.p…

RootFTrust reposted

Breaking STM32F1 firmware RDO protection : blog.zapb.de/stm32f1-except… Repo : gitlab.zapb.de/zapb/stm32f1-f…


RootFTrust reposted

CVE-2019-14079 Access to the uninitialized variable when the driver tries to unmap the dma buffer of a request which was never mapped in the first place leading to kernel failure in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdrago... cve.mitre.org/cgi-bin/cvenam…


RootFTrust reposted

My coworker just published a whitepaper that concisely summarizes the current state of the art techniques for bypassing readback protection in microcontrollers. Reverse engineer all the things! research.nccgroup.com/2020/02/20/whi…


RootFTrust reposted

Eclypsium just released its new research, "Perilous Peripherals." Millions of #Windows and #Linux systems still at risk due to firmware vulns in a variety of peripherals. Read about here: bit.ly/37Fu7n6. #firmware, #hack, #firmwaresecurity

eclypsium's tweet image. Eclypsium just released its new research, "Perilous Peripherals." Millions of #Windows and #Linux systems still at risk due to firmware vulns in a variety of peripherals. Read about here: bit.ly/37Fu7n6. #firmware, #hack, #firmwaresecurity

RootFTrust reposted

Cyber week is starting soon with an amazing cyberweek.ae/competitions/d… pwn2own. Hackers gona Hack 🤳🏼👨🏼‍💻👩🏽‍💻


RootFTrust reposted

Linux directories cheat sheet.

Alra3ees's tweet image. Linux directories cheat sheet.

RootFTrust reposted

Prof. Mark Tehranipoor, Director of FICS Research, is now recruiting PhD students interested in hardware security research. Please submit CVs and transcripts to [email protected].


RootFTrust reposted

Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers! leveldown.de/blog/svd-loade…

StackSmashing's tweet image. Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers! leveldown.de/blog/svd-loade…

RootFTrust reposted

New video! I'm starting a series on the 6502: The classic microprocessor that started the personal computer revolution. Part one is out today: youtu.be/LnzuMJLZRdU

ben_eater's tweet image. New video! I'm starting a series on the 6502: The classic microprocessor that started the personal computer revolution. Part one is out today: youtu.be/LnzuMJLZRdU

RootFTrust reposted

"Control-Flow Integrity for the Linux kernel: A Security Evaluation" is the work I've done for my Masters thesis where I analyze how the PaX Team's (public) RAP holds up to stop ROP when applied to the Linux kernel. You may want to check out chapter 3. alunos.dcc.fc.up.pt/~up201407890/T…


RootFTrust reposted

The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: limitedresults.com/2019/09/pwn-th… No way to fix it except hardware revision🥶. Stay tuned for the final act. #Esp32 #EspressifSystems

LimitedResults's tweet image. The Disclosure about Esp32 security continues.
This time, it's a secure boot bypass using voltage glitching:
limitedresults.com/2019/09/pwn-th…

No way to fix it except hardware revision🥶.
Stay tuned for the final act.

#Esp32 #EspressifSystems
LimitedResults's tweet image. The Disclosure about Esp32 security continues.
This time, it's a secure boot bypass using voltage glitching:
limitedresults.com/2019/09/pwn-th…

No way to fix it except hardware revision🥶.
Stay tuned for the final act.

#Esp32 #EspressifSystems
LimitedResults's tweet image. The Disclosure about Esp32 security continues.
This time, it's a secure boot bypass using voltage glitching:
limitedresults.com/2019/09/pwn-th…

No way to fix it except hardware revision🥶.
Stay tuned for the final act.

#Esp32 #EspressifSystems

RootFTrust reposted

Part 2 is live!✨ Heap Overflows and the iOS Kernel Heap - Case Study from an in-the-wild iOS 0-Day. Learn how the exploit developer used a clever vulnerability-conversion to turn a heap-overflow into an artificial Use-After-Free. azeria-labs.com/heap-overflows…


Loading...

Something went wrong.


Something went wrong.