Santos Merino

@santitox

Hardware security researcher Personal account. He.

██████████████
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @santitox

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @santitox

  1. Prikvačeni tweet
    5. pro 2019.

    My team is looking for people with FPGA development and crypto skillz (bonus points for those with SCA and/or FI experience). Are you interested? DMs are open.

    Poništi
  2. proslijedio/la je Tweet
    7. sij
    Poništi
  3. proslijedio/la je Tweet
    8. sij

    If a mentally unstable highschool dropout without degrees can get a job at Microsoft, anyone can achieve their dreams. Just got to keep going at it, even if you go half crazy.

    Poništi
  4. proslijedio/la je Tweet
    9. sij
    Poništi
  5. proslijedio/la je Tweet
    12. stu 2019.
    Poništi
  6. proslijedio/la je Tweet
    29. lis 2019.

    I'm writing an online book: "FPGA Design Elements", which provides a reference library of fundamental digital logic design elements. Think of it as a hardware analog to the C Standard Library ("libc") and its documentation.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    23. kol 2019.

    New paper - "Randpoline: A Software Mitigation for Branch Target Injection" Thanks for the help in reviewing and amazing discussions

    Poništi
  8. proslijedio/la je Tweet
    21. kol 2019.

    Emulating SPI-Flash chips with SPIspy for doing secure boot research, done by , enabled by open source FPGA tools written for FPGAs by the team of Eddie Hung

    Poništi
  9. proslijedio/la je Tweet
    19. kol 2019.

    Sushi Roll: A CPU research kernel with minimal noise for cycle-by-cycle micro-architectural introspection

    Poništi
  10. proslijedio/la je Tweet

    We bypassed Encrypt Only mode Secure Boot on Xilinx Zynq UltraScale+ SoCs. The two identified flaws are design issues which allow secure boot bypass. The 1st one affects the hardware boot ROM and therefore has no mitigation.

    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    24. srp 2019.

    It took us some serious time, but I've finally got all required official approvals to continue working on UEFITool, huge props to for making that happen. My first commit since 2016, adding ME region parser and extended ucode header parser:

    Poništi
  13. 23. srp 2019.

    TDef decryption script working ☑️

    Poništi
  14. 22. srp 2019.

    Finally managed to get my own collection of Intel VISA XMLs

    Poništi
  15. 15. srp 2019.

    Shouldn't this read 'Yes' instead?

    Prikaži ovu nit
    Poništi
  16. 15. srp 2019.

    Ok, for whatever reason AMI tool doesn't work for me ¯\_(ツ)_/¯. But now it's ok.

    Prikaži ovu nit
    Poništi
  17. 15. srp 2019.

    Would you have any idea why I cannot halt cores via DCI? (cc: )

    Prikaži ovu nit
    Poništi
  18. 11. sij 2019.

    To avoid simulation issues do not forget to set "Automatic Update and Compile Order" in the Hierarchy Update settings of Xilinx Vivado 2018.

    Poništi
  19. proslijedio/la je Tweet
    8. sij 2019.

    It's been about 2 years, and I'm still astonished by this AMAZING talk by and . Dumping so much knowledge and internals on stage, one of the greatest talks ever. Keep the great work guys!

    Poništi
  20. proslijedio/la je Tweet
    29. pro 2018.

    Video of talk: Slides are online: Boot rom glitching scripts + various SCE decryption utils: More to come!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·