p.file
213 subscribers
51 photos
7 videos
156 files
291 links
Please read the pinned post.

The group has restriction for links due to spam bots, but you can send it anyway.

@perplex_files
Download Telegram
2022-06-17_17-05_scrot.png
630.3 KB
#notes #hardware #hacking

(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.

From Hardware Security: A Hands-on Learning Approach.
p.file
The State of the Art in IC Reverse Engineering.pdf
For those who like IC Reverse Engineering, this article is a must-read.
The TTY demystified.pdf
800 KB
Topics: Linux TTY. #linux

Useful information about Linux TTY.

https://www.linusakesson.net/programming/tty/
Topics: Compilation, Compilers. #programming #learning

Advanced Topics in Compilation. Great resources.

https://matt.might.net/teaching/advanced-compilers/2013-fall/
CursorList.pdf
63.4 KB
Cursor Linked List. #programming

Cursor Implementation of Linked Lists. Cursors are useful in FORTRAN and other languages without pointer types.
#tool

Software-based "jailbreak" allowing all ivybridge-based xx30 thinkpads to softmod custom bios images.

BIOS Mod Features:

Overclocking support (35xx, 37xx, 38xx, 39xx CPUs);
Whitelist removal to use any WLAN/WWAN adapter;
Advanced menu (custom fan curve, TDP, etc);
Intel ME "Soft Temporary Disable" via advanced menu.

https://github.com/n4ru/1vyrain
ndss2021_4B-2_23021_paper.pdf
22.2 MB
Topics: Screen Gleaning, Tempest Attack. #hardware #hacking

Screen Gleaning: A screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel.