cxcv: hardware*

20 bookmark(s) - Sort by: Date / Title ↑ / - Bookmarks from other users for this tag

  1. graphics programming
  2. Tags: , , , by Benjamin Schweizer (2006-06-19)
  3. Tags: , , by Benjamin Schweizer (2006-03-02)
  4. Tags: , , by Benjamin Schweizer (2010-07-12)
  5. Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and straightforward defenses. More complex designs that attack the software are unexplored, as are the countermeasures an attacker may take to bypass proposed defenses. (via fefe)
  6. Tags: , , , , by Benjamin Schweizer (2009-02-03)
  7. der Funkuhr und Time Server Spezialist
    Tags: , , , by Benjamin Schweizer (2010-06-01)
  8. The first time I saw details about the Tigon2, I came up with the idea that it could be used to make a back door, remote gdb stub or remote sniffer in the firmware. In this paper, I will explain a way to develop such firmware programs and also the associated security risks.
  9. Tags: , , by Benjamin Schweizer (2008-01-07)

Top of the page

First / Previous / Next / Last / Page 1 of 2 Bookmarks: Tags: hardware

About - Propulsed by SemanticScuttle