Topics: MIT Courses. #programming #comp_arch #learning
MIT courses of Electrical Engineering and Computer Science.
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/
MIT courses of Electrical Engineering and Computer Science.
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/
MIT OpenCourseWare
Search | MIT OpenCourseWare | Free Online Course Materials
MIT OpenCourseWare is a web based publication of virtually all MIT course content. OCW is open and available to the world and is a permanent MIT activity
MOLES_Malicious_off-chip_leakage_enabled_by_side-c.pdf
495 KB
Topics: MOLES, Side-Channel Attack, Differential Power Analysis. #hardware #crypto
Malicious Off-Chip Leakage Enabled by Side-Channels (MOLES) is implemented with spread-spectrum techniques to create additional side-channels that can leak information below the noise power level, thus hardening the process of trojan detection, since only the attacker knows how to extract the information leaked by the side-channels.
Malicious Off-Chip Leakage Enabled by Side-Channels (MOLES) is implemented with spread-spectrum techniques to create additional side-channels that can leak information below the noise power level, thus hardening the process of trojan detection, since only the attacker knows how to extract the information leaked by the side-channels.
p.file
MOLES_Malicious_off-chip_leakage_enabled_by_side-c.pdf
Additional information about spread-spectrum:
https://www.ni.com/pt-br/innovations/white-papers/06/understanding-spread-spectrum-for-communications.html
https://www.electronics-notes.com/articles/radio/dsss/what-is-direct-sequence-spread-spectrum.php (using the XOR)
https://www.ni.com/pt-br/innovations/white-papers/06/understanding-spread-spectrum-for-communications.html
https://www.electronics-notes.com/articles/radio/dsss/what-is-direct-sequence-spread-spectrum.php (using the XOR)
Ni
Understanding Spread Spectrum for Communications
This document covers an introduction to RF, wireless and high-frequency signals and systems.
#learning #misc
https://sci.hubg.org/
@scihubot
The first pirate website in the world to provide mass and public access to tens of millions of research papers.
https://sci.hubg.org/
@scihubot
The first pirate website in the world to provide mass and public access to tens of millions of research papers.
Scan Based Attacks.pdf
294.9 KB
Topics: Scan Chain, Scan Based Attacks, JTAG. #hardware #reversing
This paper explains how Scan-based Design-for-Test (DFT) can be used to compromise the security of a microchip and extract the secret keys of a cryptographic algorithm.
This paper explains how Scan-based Design-for-Test (DFT) can be used to compromise the security of a microchip and extract the secret keys of a cryptographic algorithm.
Forwarded from FreeBSD
cs631-video-lectures.zip
1.4 GB
Advanced Programming in the UNIX Environment - Complete Course
In this course (CS631) from Stevens Institute of Technology taught by Jan Schaumann, you will learn to develop complex system-level software in the C programming language while gaining an intimate understanding of the Unix operating system and its programming environment.
—Topics covered include the user/kernel interface, fundamental concepts of Unix, user authentication, basic and advanced I/O, fileystems, signals, process relationships, and interprocess communication. Fundamental concepts of software development and maintenance on Unix systems (development and debugging tools such as "make" and "gdb") will also be covered.
—Full course schedule, slides and programs can be found at:
https://stevens.netmeister.org/631/
—Full video series (56) is available on youtube too:
https://www.youtube.com/watch?v=BsB9Cg6yJc4&list=PL0qfF8MrJ-jxMfirAdxDs9zIiBg2Wug0z&index=1
In this course (CS631) from Stevens Institute of Technology taught by Jan Schaumann, you will learn to develop complex system-level software in the C programming language while gaining an intimate understanding of the Unix operating system and its programming environment.
—Topics covered include the user/kernel interface, fundamental concepts of Unix, user authentication, basic and advanced I/O, fileystems, signals, process relationships, and interprocess communication. Fundamental concepts of software development and maintenance on Unix systems (development and debugging tools such as "make" and "gdb") will also be covered.
—Full course schedule, slides and programs can be found at:
https://stevens.netmeister.org/631/
—Full video series (56) is available on youtube too:
https://www.youtube.com/watch?v=BsB9Cg6yJc4&list=PL0qfF8MrJ-jxMfirAdxDs9zIiBg2Wug0z&index=1
A_Security_Evaluation_Methodology_for_Smart_Cards_Against_Electromagnetic.pdf
283.4 KB
Topics: Electromagnetic Side-Channel Attack, EM Simulation. #hardware #reversing
Security Evaluation against EM side-channel attack using an EM simulation methodology.
This EM simulation methodology involves current flow simulation, chip layout parasitics extraction, then data processing to simulate direct EM emissions or modulated emissions.
Security Evaluation against EM side-channel attack using an EM simulation methodology.
This EM simulation methodology involves current flow simulation, chip layout parasitics extraction, then data processing to simulate direct EM emissions or modulated emissions.
Topics: PCI-based DMA Attack. #hardware #exploit
https://github.com/carmaa/inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe HW interfaces.
https://github.com/carmaa/inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe HW interfaces.
GitHub
GitHub - carmaa/inception: Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can…
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. - carm...
Topics: Exploits, Google Chrome. #exploit #reversing
Chrome in-the-wild bug analysis: CVE-2021-30632.
https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_30632/
Chrome in-the-wild bug analysis: CVE-2021-30632.
https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_30632/
Practical C++ Decompilation.pdf
794 KB
Topics: C++ Decompilation. #reversing #cpp
This pdf is useful if you want to understand the C++ structure in a low-level perspective, also it will help you when reverse engineering C++ applications.
This pdf is useful if you want to understand the C++ structure in a low-level perspective, also it will help you when reverse engineering C++ applications.
Project_Zero_Exploiting_the_DRAM_rowhammer_bug_to_gain_kernel_privileges.pdf
2.4 MB
Topics: DRAM Rowhammer. #hardware #hacking
In this article they use the rowhammer to gain kernel privileges. The idea is to
In this article they use the rowhammer to gain kernel privileges. The idea is to
mmap() a large block of memory and search for addresses where bits are flipped, then spray the physical memory with page tables in order to make the PTE's physical page number point to their process, and hammer the aggressor addresses.
p.file
Project_Zero_Exploiting_the_DRAM_rowhammer_bug_to_gain_kernel_privileges.pdf
Flipping_Bits_in_Memory_Without_Accessing_Them_An_experimental_Study.pdf
827.9 KB
The repeated toggling of a row's wordline can disturb nearby cells and make them lose charge, if a cell loses too much charge before it is restored, it experiences a disturbance error. The following code is used to disturb the cells:
code1a:
mov (X), %eax
mov (Y), %ebx
clflush (X) // See Vol 3 11.5.5clflush (Y)
mfence // Not used in the Google's article.
jmp code1a
p.file
Flipping_Bits_in_Memory_Without_Accessing_Them_An_experimental_Study.pdf
In this structure, when the access transistor is turned on by applying a voltage on the gate of the access transistor, a voltage representing the data value is placed onto the bitline and charges the storage capacitor. The storage capacitor then retains the stored charge after the access transistor is turned off and the voltage on the wordline is removed. However, the electrical charge stored in the storage capacitor will gradually leak away with the passage of time. To ensure data integrity, the stored data value in the DRAM cell must be periodically read out and written back by the DRAM device in a process known as refresh.
From Memory Systems: Cache, DRAM, Disk.
From Memory Systems: Cache, DRAM, Disk.