RootFTrust (ரூட்ஆப்டிரஸ்ட்)

@parallel_beings

Embedded Security - Working in Automotive. Master Graduate (கற்றது கைமண் அளவு, கல்லாதது உலகளவு). Thoughts and opinions are of 127.0.0.1

Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @parallel_beings

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @parallel_beings

  1. Prikvačeni tweet

    Embedded Security : To-Do / Learning List

    Poništi
  2. 20. sij

    Excited to share this Youtube playlist of videos we made and where I explain/discuss basics in operating systems! Its loosely based on Three Easy Pieces OS textbook. Playlist includes demos and code walkthroughs!

    Prikaži ovu nit
    Poništi
  3. 13. pro 2019.

    If ‘hardware design” wouldn’t be hard - it would be called “software design”. Enter: “LiteX: an open-source SoC builder and library based on Migen Python DSL” GitHub: Overview: Follow:

    Poništi
  4. 30. lis 2019.

    I created a TLS challenge (Evil Corp) for the 4future CTF at . Only one team was able to solve it, so I created a writeup of the intended solution. CC:

    Poništi
  5. 15. lis 2019.

    Thanks a lot to Abu Dhabi 2019 for hosting my talk: "Securing a Laptop like you *mean it: Virtualization Based Security"! The slideset with additional notes can be found at , and the recording here:

    Poništi
  6. 10. lis 2019.

    Cyber week is starting soon with an amazing pwn2own. Hackers gona Hack 🤳🏼👨🏼‍💻👩🏽‍💻

    Poništi
  7. 6. lis 2019.

    Linux directories cheat sheet.

    Poništi
  8. 30. ruj 2019.

    Prof. Mark Tehranipoor, Director of FICS Research, is now recruiting PhD students interested in hardware security research. Please submit CVs and transcripts to tehranipoor@ufl.edu.

    Poništi
  9. 16. ruj 2019.

    Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers!

    Prikaži ovu nit
    Poništi
  10. 15. ruj 2019.

    Here's my write-up for the challenge. Includes a working exploit that features process continuation and bypasses ASLR and DEP.

    Poništi
  11. 14. ruj 2019.

    New video! I'm starting a series on the 6502: The classic microprocessor that started the personal computer revolution. Part one is out today:

    Poništi
  12. 13. ruj 2019.

    "Control-Flow Integrity for the Linux kernel: A Security Evaluation" is the work I've done for my Masters thesis where I analyze how the PaX Team's (public) RAP holds up to stop ROP when applied to the Linux kernel. You may want to check out chapter 3.

    Prikaži ovu nit
    Poništi
  13. 1. ruj 2019.

    The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: No way to fix it except hardware revision🥶. Stay tuned for the final act.

    Poništi
  14. 5. ruj 2019.

    Part 2 is live!✨ Heap Overflows and the iOS Kernel Heap - Case Study from an in-the-wild iOS 0-Day. Learn how the exploit developer used a clever vulnerability-conversion to turn a heap-overflow into an artificial Use-After-Free.

    Prikaži ovu nit
    Poništi
  15. Side channel analysis of RF emission using and to steal PIN numbers from thin air. This is really impressive work… and also deeply scary. HT

    Poništi
  16. 6. ruj 2019.

    Continuing my series about Intel Processor Traces. Part3 is about how PT can help analyzing performance glitches.

    Poništi
  17. 8. ruj 2019.

    Secured Android Smartphone - a brief spec and overview by

    Poništi
  18. 9. ruj 2019.
    Poništi
  19. 9. ruj 2019.
    Poništi
  20. 7. kol 2019.
    Poništi
  21. Nvidia .. my Jetbot looks like a half cooked chicken roaming around.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·