#hardware_security search results
Sharing our work, UntrustZone, at @IEEESSP was a cool experience, and meeting one of my inspirations, the guy behind Spectre and DPA, was the cherry on top! #hardware_security
#tools #Offensive_security #Hardware_Security FortiGate VPN-SSL Honeypot pgj11.com/posts/FortiGat… ]-> Repo - github.com/PeterGabaldon/… // A deception honeypot that mimics FortiGate VPN-SSL devices to trap brute force attempts, detect deliberately exfiltrated credentials for…
#Research #Hardware_Security "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions", 2025. ]-> zenodo.org/records/146809… // .. we demonstrate end-to-end attack exploit chains that build on the LVP to obtain a 64-bit read primitive within the Safari and Chrome browsers
#Research #Hardware_Security "NVIDIA GPU Memory Exploitation for Fun and Profit", 2024. ]-> PoC for code reuse and code injection attacks for CUDA applications - github.com/SecureArch/gpu… ]-> Memory Dumper - github.com/0x5ec1ab/gpu-t… // .. due to GPU’s unique memory system, GPU…
#reversing #Kernel_Security #Hardware_Security "Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks", 2025. ]-> Open-source tooling, test cases, and PoC exploits - github.com/vusec/training… // The paper presents three new Spectre attack variants that…
#reversing #IoT_Security #Hardware_Security Bypassing Microchip Atmel SAM E70/S70/V70/V71 Security (CVE-2024-4760) 0x01team.com/hw_security/by… ]-> Code - github.com/Waleedmz10/Byp… // The vulnerability is on the silicon level of the Atmel SAM E70/S70/V70/V71 family, therefore, it is…
#Mobile_Security #Hardware_Security Black Hat USA 2025: "Breaking Chains: Hacking Android Key Attestation" ]-> Android key attestation library github.com/google/android… // This presentation will take attendees on a deep dive into the Android Keystore, Android key attestation, and…
#Hardware_Security "HAMLOCK: HArdware-Model LOgically Combined attacK", Oct. 2025. ]-> github.com/Imsanskar/HAML… // This paper introduces the HArdware-Model Logically Combined Attack - threat that distributes the attack logic across the hardware-software boundary. The software…
Publicadas todas las charlas del congreso CriptoredCon2024 celebrado en marzo de 2024 junto a @rootedcon. 12 ponencias (criptored.es/con/) que cubren temáticas muy variadas #hacking #hardware_security #cryptography #machinelearning #iot #privacy #android #blockchain #cloud.…
#exploit #Whitepaper #Hardware_Security "Breaking BMC: The Forgotten Key to the Kingdom", NVIDIA Offensive Security Research, 2025. ]-> Ghost in the Controller: Abusing Supermicro BMC Firmware Verification - binarly.io/blog/ghost-in-… ]-> Broken Trust: Fixed Supermicro BMC Bug…
#Hardware_Security "RMPocalypse: How a Catch-22 Breaks AMD SEV-SNP", CCS 2025. ]-> rmpocalypse.github.io ]-> Repo/Code - github.com/rmpocalypse // With RMPocalypse, we demonstrate an attack on all AMD processors that support SEV-SNP (Zen 3/4/5) and compromise all confidential…
#SCA #reversing #Hardware_Security "WireTap: Breaking Server SGX via DRAM Bus Interposition", CCS, 2025. ]-> wiretap.fail // By observing read and write operations to memory, it is possible to derive keys stored in Intel SGX and break the security of systems relying…
#SCA #Research #Hardware_Security "Chypnosis: Stealthy Secret Extraction using Undervolting-based Static Side-channel Attacks", 2025. ]-> An in-chip countermeasure against static side-channel analysis attacks, built for deployment in FPGAs - github.com/0xADE1A1DE/Bor… // Static…
#Research #Hardware_Security "NVIDIA GPU Confidential Computing Demystified", 2025. ]-> NVIDIA GPU Admin Tools - github.com/NVIDIA/gpu-adm…
github.com
GitHub - NVIDIA/gpu-admin-tools: GPU Admin Tools. Includes Confidential Computing controls for...
GPU Admin Tools. Includes Confidential Computing controls for H100, and other functionality - NVIDIA/gpu-admin-tools
#Kernel_Security #Hardware_Security "Heracles: Chosen Plaintext Attack on AMD SEV-SNP", 2025. ]-> github.com/heracles-attack // In our case studies, we leak kernel memory, crypto keys, and user passwords, as well as demonstrate web session hijacking
#reversing #Hardware_Security Google Nest Wifi Pro: Glitching from Root to EL3 Part 1 - Characterization - raelize.com/blog/google-wi… Part 2 - Arbitrary read and write - raelize.com/blog/google-wi… Part 3 - Arbitrary code execution - raelize.com/blog/google-wi… // Qualcomm IPQ5018 SoC is…
#hardening #Whitepaper #Hardware_Security #TBT "Windows 11 Security Book: Security by design. Security by default", Nov. 2024. See also: ]-> Windows 11 Secured-core PCs - learn.microsoft.com/en-us/windows-… ]-> Win10/11/2016/2019/2022 Trusted Platform Module (TPM) Settings -…
#exploit #Cloud_Security #Hardware_Security "Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities", 2025. ]-> "L1TF Reloaded" PoC Exploit - vusec.net/projects/rain/ ]-> Affected Processors - intel.com/content/www/us… // this research provides a detailed…
vusec.net
Rain: Cloud Leakage via Hardware Vulnerabilities - vusec
The discovery of Spectre and Meltdown in 2017 marked the first instances of “transient execution vulnerabilities”. These are vulnerabilities in the internal design of CPUs (their “microarchitecture...
#Hardware_Security "HAMLOCK: HArdware-Model LOgically Combined attacK", Oct. 2025. ]-> github.com/Imsanskar/HAML… // This paper introduces the HArdware-Model Logically Combined Attack - threat that distributes the attack logic across the hardware-software boundary. The software…
#Hardware_Security "HAMLOCK: HArdware-Model LOgically Combined attacK", Oct. 2025. ]-> github.com/Imsanskar/HAML… // This paper introduces the HArdware-Model Logically Combined Attack - threat that distributes the attack logic across the hardware-software boundary. The software…
#Hardware_Security "HAMLOCK: HArdware-Model LOgically Combined attacK", Oct. 2025. ]-> github.com/Imsanskar/HAML… // This paper introduces the HArdware-Model Logically Combined Attack - threat that distributes the attack logic across the hardware-software boundary. The software…
#reversing #Kernel_Security #Hardware_Security "Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks", 2025. ]-> Open-source tooling, test cases, and PoC exploits - github.com/vusec/training… // The paper presents three new Spectre attack variants that…
#Hardware_Security "RMPocalypse: How a Catch-22 Breaks AMD SEV-SNP", CCS 2025. ]-> rmpocalypse.github.io ]-> Repo/Code - github.com/rmpocalypse // With RMPocalypse, we demonstrate an attack on all AMD processors that support SEV-SNP (Zen 3/4/5) and compromise all confidential…
#tools #Offensive_security #Hardware_Security FortiGate VPN-SSL Honeypot pgj11.com/posts/FortiGat… ]-> Repo - github.com/PeterGabaldon/… // A deception honeypot that mimics FortiGate VPN-SSL devices to trap brute force attempts, detect deliberately exfiltrated credentials for…
#SCA #reversing #Hardware_Security "WireTap: Breaking Server SGX via DRAM Bus Interposition", CCS, 2025. ]-> wiretap.fail // By observing read and write operations to memory, it is possible to derive keys stored in Intel SGX and break the security of systems relying…
#exploit #Whitepaper #Hardware_Security "Breaking BMC: The Forgotten Key to the Kingdom", NVIDIA Offensive Security Research, 2025. ]-> Ghost in the Controller: Abusing Supermicro BMC Firmware Verification - binarly.io/blog/ghost-in-… ]-> Broken Trust: Fixed Supermicro BMC Bug…
#exploit #Cloud_Security #Hardware_Security "Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities", 2025. ]-> "L1TF Reloaded" PoC Exploit - vusec.net/projects/rain/ ]-> Affected Processors - intel.com/content/www/us… // this research provides a detailed…
vusec.net
Rain: Cloud Leakage via Hardware Vulnerabilities - vusec
The discovery of Spectre and Meltdown in 2017 marked the first instances of “transient execution vulnerabilities”. These are vulnerabilities in the internal design of CPUs (their “microarchitecture...
#SCA #Research #Hardware_Security "Chypnosis: Stealthy Secret Extraction using Undervolting-based Static Side-channel Attacks", 2025. ]-> An in-chip countermeasure against static side-channel analysis attacks, built for deployment in FPGAs - github.com/0xADE1A1DE/Bor… // Static…
#reversing #IoT_Security #Hardware_Security Bypassing Microchip Atmel SAM E70/S70/V70/V71 Security (CVE-2024-4760) 0x01team.com/hw_security/by… ]-> Code - github.com/Waleedmz10/Byp… // The vulnerability is on the silicon level of the Atmel SAM E70/S70/V70/V71 family, therefore, it is…
#Mobile_Security #Hardware_Security Black Hat USA 2025: "Breaking Chains: Hacking Android Key Attestation" ]-> Android key attestation library github.com/google/android… // This presentation will take attendees on a deep dive into the Android Keystore, Android key attestation, and…
#Research #Hardware_Security "FLOP: Breaking the Apple M3 CPU via False Load Output Predictions", 2025. ]-> zenodo.org/records/146809… // .. we demonstrate end-to-end attack exploit chains that build on the LVP to obtain a 64-bit read primitive within the Safari and Chrome browsers
#Kernel_Security #Hardware_Security "Heracles: Chosen Plaintext Attack on AMD SEV-SNP", 2025. ]-> github.com/heracles-attack // In our case studies, we leak kernel memory, crypto keys, and user passwords, as well as demonstrate web session hijacking
#Research #Hardware_Security "NVIDIA GPU Memory Exploitation for Fun and Profit", 2024. ]-> PoC for code reuse and code injection attacks for CUDA applications - github.com/SecureArch/gpu… ]-> Memory Dumper - github.com/0x5ec1ab/gpu-t… // .. due to GPU’s unique memory system, GPU…
#Events #Hardware_Security #Offensive_security "Why "Adams Bridge" Leaks: Attacking a PQC Root-of-Trust", Hardwear io USA 2025. ]-> ML-DSA hardware accelerator - github.com/ml-dsa/abr-sim See also: Talks from hardwear.io USA 2025 - hardwear.io/archives/usa-2…
github.com
GitHub - ml-dsa/abr-sim: Adam's Bridge (ML-DSA hardware accelerator) verilator wrapper -- create...
Adam's Bridge (ML-DSA hardware accelerator) verilator wrapper -- create "toggle" traces from VCD dumps - ml-dsa/abr-sim
#reversing #Hardware_Security Google Nest Wifi Pro: Glitching from Root to EL3 Part 1 - Characterization - raelize.com/blog/google-wi… Part 2 - Arbitrary read and write - raelize.com/blog/google-wi… Part 3 - Arbitrary code execution - raelize.com/blog/google-wi… // Qualcomm IPQ5018 SoC is…
#Fuzzing #Research #Hardware_Security "Qualcomm Trusted Application Emulation for Fuzzing Testing", 2025. ]-> tool for emulating ARM64 trusted apps - github.com/hanhan3927/use… // This research centers on trusted applications (TAs) the Qualcomm TEE and introduces a novel emulator…
github.com
GitHub - hanhan3927/usenix2025-qualcomm-trusted-application-emulation-for-fuzzing-testing: [USENIX...
[USENIX Security 2025] Qualcomm Trusted Application Emulation for Fuzzing Testing - hanhan3927/usenix2025-qualcomm-trusted-application-emulation-for-fuzzing-testing
#Research #MLSecOps #Hardware_Security "GPUHammer: Rowhammer Attacks on GPU Memories are Practical", USENIX Security 2025. ]-> gpuhammer.com ]-> Code to reproduce + exploit on ML applications - zenodo.org/records/156945… // Accuracy degradation attack on ImageNet models…
#hardening #Whitepaper #Hardware_Security #TBT "Windows 11 Security Book: Security by design. Security by default", Nov. 2024. See also: ]-> Windows 11 Secured-core PCs - learn.microsoft.com/en-us/windows-… ]-> Win10/11/2016/2019/2022 Trusted Platform Module (TPM) Settings -…
learn.microsoft.com
Windows 11 Secured-core PCs
This document provides an overview of the Windows 11 Secured-core PCs and Baseline Windows security for device purchase decision makers.
#SCA #Cyber_Education #Hardware_Security EM attack on Espressif ESP32 SoC 1. Breaking HW AES with Power Analysis - raelize.com/blog/espressif… 2. Breaking HW AES with Electromagnetic Analysis - raelize.com/blog/espressif… 3. Glitching The OTP Data Transfer - raelize.com/blog/espressif… 4.…
RT SecNewsDesk: .chain integrates #blockchain_technology with .Thalesesecurity #hardware_security modules …
@IslamElsadek77 shares his impressive research for this month's #StudentSpotlight. Be sure to check it out and wish him well! 👏 linkedin.com/feed/update/ur… @OhioState @OhioStateECE @ElectroSciOSU #Hardware_security #LWC #RISC-V #energy_efficiency #LWC #PQC
Department of Electronics and Communication Engineering has organized a National E-Conference on topic" Hardware Security". the event is scheduled to be conducted on 26th June 2020. #AVIT_webinar #ece #hardware_security #skill #deveopment #webinar #onlinelearning #campuslife
Sharing our work, UntrustZone, at @IEEESSP was a cool experience, and meeting one of my inspirations, the guy behind Spectre and DPA, was the cherry on top! #hardware_security
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2024 WINTER submission is OPEN. IEEE HOST 2024 will be held in May 2024 in Washington D.C., USA. More Info: hostsymposium.org #hardware #security #hardware_security
IEEE HOST 2023 CALL for PAPER abstract deadline is TODAY. IEEE HOST 2023 will be held May 1-4, 2023 in San Jose, California. More info: hostsymposium.org/call-for-paper… #hardware #security #hardware_security
IEEE HOST 2023 EXTENDs the CALL for TUTORIALs deadline. If you are still interested, Deadline now Dec. 16, 2022. More info: hostsymposium.org/call-for-tutor… #hardware #security #hardware_security
Missed the FALL submission deadline of IEEE HOST 2023? IEEE HOST 2023 WINTER submission is now OPEN. IEEE HOST 2023 will be held May 1-4, 2023 in San Jose, California. More Info: hostsymposium.org/call-for-paper… #hardware #security #hardware_security
The IEEE HOST 2024 WINTER abstract submission deadline is ONE WEEK away. Contributing to all areas of hardware and security overlap, the IEEE HOST 2024 will be held May 6-9, 2024 in Washington DC, USA. More info: hostsymposium.org #hardware #security #hardware_security
Are you a soon-to-be or recently graduated Ph.D. student in the field of hardware-oriented security and trust? IEEE HOST 2023 just opened its call for the doctoral dissertation competition. More info: hostsymposium.org/call-for-compe… #hardware #security #hardware_security
IEEE HOST 2023 "Hardware Demo" submission deadline is only FIVE DAYS away. An interesting opportunity to demonstrate your latest (HW-oriented) tools and frameworks to the hardware security community! More info: hostsymposium.org/call-for-hwdem… #hardware #security #hardware_security
Something went wrong.
Something went wrong.
United States Trends
- 1. Colts 32K posts
- 2. Jonathan Taylor 5,966 posts
- 3. Falcons 19.7K posts
- 4. Daniel Jones 6,828 posts
- 5. Bijan 4,531 posts
- 6. Penix 5,668 posts
- 7. Drake London 3,320 posts
- 8. Konate 13K posts
- 9. Max B 16.4K posts
- 10. Liverpool 143K posts
- 11. #ForTheShoe 2,251 posts
- 12. Pitts 3,844 posts
- 13. Zac Robinson N/A
- 14. Raheem Morris 1,398 posts
- 15. Tyler Allgeier 1,312 posts
- 16. $LMT $450.50 Lockheed F-35 N/A
- 17. $APDN $0.20 Applied DNA N/A
- 18. $SENS $0.70 Senseonics CGM N/A
- 19. #Talus_Labs N/A
- 20. Haaland 42.8K posts