2022-06-17_17-05_scrot.png
630.3 KB
#notes #hardware #hacking
(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.
From Hardware Security: A Hands-on Learning Approach.
(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.
From Hardware Security: A Hands-on Learning Approach.
p.file
The State of the Art in IC Reverse Engineering.pdf
For those who like IC Reverse Engineering, this article is a must-read.
The TTY demystified.pdf
800 KB
Topics: Linux TTY. #linux
Useful information about Linux TTY.
https://www.linusakesson.net/programming/tty/
Useful information about Linux TTY.
https://www.linusakesson.net/programming/tty/
p.file
The TTY demystified.pdf
https://www.oreilly.com/library/view/linux-device-drivers/0596005903/ch18.html
https://www.kernel.org/doc/html/latest/driver-api/tty/index.html
https://www.kernel.org/doc/html/latest/driver-api/tty/index.html
O’Reilly Online Learning
Linux Device Drivers, 3rd Edition
Chapter 18. TTY Drivers A tty device gets its name from the very old abbreviation of teletypewriter and was originally associated only with the physical or virtual terminal connection to … - Selection from Linux Device Drivers, 3rd Edition [Book]
Topics: Compilation, Compilers. #programming #learning
Advanced Topics in Compilation. Great resources.
https://matt.might.net/teaching/advanced-compilers/2013-fall/
Advanced Topics in Compilation. Great resources.
https://matt.might.net/teaching/advanced-compilers/2013-fall/
CursorList.pdf
63.4 KB
Cursor Linked List. #programming
Cursor Implementation of Linked Lists. Cursors are useful in FORTRAN and other languages without pointer types.
Cursor Implementation of Linked Lists. Cursors are useful in FORTRAN and other languages without pointer types.
p.file
My_aimful_life_Building_reliable_SMM_backdoor_for_UEFI_based_platforms.pdf
A Real SMM Rootkit: Reversing and Hooking BIOS SMI Handlers.pdf
223 KB
Topics: SMM Rootkits. #hacking #malware #rootkit
A Real SMM Rootkit: Reversing and Hooking BIOS SMI Handlers.
https://phrack.org/issues/66/11.html#article
A Real SMM Rootkit: Reversing and Hooking BIOS SMI Handlers.
https://phrack.org/issues/66/11.html#article
#tool
Software-based "jailbreak" allowing all ivybridge-based xx30 thinkpads to softmod custom bios images.
BIOS Mod Features:
Overclocking support (35xx, 37xx, 38xx, 39xx CPUs);
Whitelist removal to use any WLAN/WWAN adapter;
Advanced menu (custom fan curve, TDP, etc);
Intel ME "Soft Temporary Disable" via advanced menu.
https://github.com/n4ru/1vyrain
Software-based "jailbreak" allowing all ivybridge-based xx30 thinkpads to softmod custom bios images.
BIOS Mod Features:
Overclocking support (35xx, 37xx, 38xx, 39xx CPUs);
Whitelist removal to use any WLAN/WWAN adapter;
Advanced menu (custom fan curve, TDP, etc);
Intel ME "Soft Temporary Disable" via advanced menu.
https://github.com/n4ru/1vyrain
GitHub
GitHub - n4ru/1vyrain: LiveUSB Bootable exploit chain to unlock all features of xx30 ThinkPad machines. WiFi Whitelist, Advanced…
LiveUSB Bootable exploit chain to unlock all features of xx30 ThinkPad machines. WiFi Whitelist, Advanced Menu, Overclocking. - n4ru/1vyrain
p.file
blog-frizk-net-2021-10-acorn-html.pdf
Topics: UEFI Runtime Services. #hacking
I stumbled again on this blog while reading about UEFI.
https://blog.frizk.net/2017/01/attacking-uefi-and-linux.html
I stumbled again on this blog while reading about UEFI.
https://blog.frizk.net/2017/01/attacking-uefi-and-linux.html
blog.frizk.net
Attacking UEFI Runtime Services and Linux
Attackers with physical access are able to attack the firmware on many fully patched computers with DMA - Direct Memory Access. Once code ex...
ndss2021_4B-2_23021_paper.pdf
22.2 MB