Alex Salikov

@Alex_Salikov

Programming, reverse engineering and information security.

Russia, Moscow
Vrijeme pridruživanja: veljača 2011.

Tweetovi

Blokirali ste korisnika/cu @Alex_Salikov

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Alex_Salikov

  1. proslijedio/la je Tweet
    25. sij

    How to Solve Problems & Achieve Goals - After answering 10,000 questions I've decided it's time I make a tutorial on how to solve problems using the scientific method as it relates to game hacking

    Poništi
  2. proslijedio/la je Tweet
    22. sij

    We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    Please re-tweet: These who wanted to build amateur open-source ICs - now have a hope: Read what is doing at and . It's already had several tape-outs!

    Poništi
  4. proslijedio/la je Tweet
    12. sij

    First Post of the year! Glitch the Nuvoton M2351 MKROM and its crypto. This MCU is based on Cortex-M23 (TrustZone-M) and dedicated to IoT security: 💅💅💅

    Poništi
  5. proslijedio/la je Tweet
    10. sij

    Unusual Dallas Semiconductor wafer is entirely test circuitry, with 20 test blocks repeated over the wafer. Everything from transistors of different sizes to flash memory cells. Not shown: resistors of many types, anti-fuses, capacitors, isolation, and other chip structures.

    Microscope photo of silicon die showing complex test circuitry.
    A silicon wafer.
    Test circuitry on the die with transistors of various sizes. Labeled "30V PCH". Multiple pads for source, gate, and drain.
    Test circuitry labeled "Flash Memory". One test cell with "1.5 um rules", one with "1.2 um rules".
    Poništi
  6. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  8. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.

    A few years ago, I crowdfunded and published "The Essential Guide to Shenzhen". It's now out of stock, so I've decided to share the PDF. Thank you to all my supporters who made this possible!

    Poništi
  11. proslijedio/la je Tweet
    12. pro 2019.

    open-source Wi-Fi baseband chip/FPGA design, openwifi is online: . full stack real time SDR (Software Defined Radio) Wi-Fi implementation on FPGA with embedded ARM Linux. compatible with Linux mac80211 SoftMAC framework. Christmas present to research!

    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    11. pro 2019.

    crauEmu was rewritten using new uEmu extension system!

    Poništi
  14. proslijedio/la je Tweet
    10. pro 2019.

    Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!

    Poništi
  15. proslijedio/la je Tweet
    6. pro 2019.

    My book chapter on side channels is now out – from Tempest though DPA, template attacks and TPM-fail, and all kinds of acoustic and optical leakage, to Meltdown and Spectre. Comments welcome:

    Poništi
  16. proslijedio/la je Tweet
    20. stu 2019.

    Do you love real-life DPA examples? While don't miss breaking a phone boot encryption by A. Vasselle, P. Maurine, and M. Cozzi (from / LIRMM), see .

    Poništi
  17. proslijedio/la je Tweet
    14. stu 2019.

    Hot on the heels of the first part of my "Exploiting Intel's Management Engine" series of articles, here is part 2, porting to ME 11.x : Includes release of the ME 11.x exploit and an MFS manipulation tool.

    Poništi
  18. proslijedio/la je Tweet
    13. stu 2019.

    Part 1 of my articles explaining how 's exploit of the Intel ME works and how to JTAG a skylake's ME and control its USB devices via the ME :

    Poništi
  19. proslijedio/la je Tweet
    14. stu 2019.

    I'm still working on my writeup but in the meanwhile, here's my code:

    Poništi
  20. proslijedio/la je Tweet
    5. stu 2019.
    OpenTitan logo
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·