using cpu system management mode to circumvent operating system security functions. loïc duflot, daniel etiemble, olivier grumelard.
Reprinted from: CACM 27/8, pp. 761-763 » .
"breaking 104 bit wep in less than 60 seconds", erik tews, ralf-philipp weinmann and andrei pyshkin.
"the unbearable lightness of pin cracking", omer berkman and odelia moshe ostrovsky.
There's a new staff and a new release of the legendary phrack e-zine. (how could I miss this?)
Dorrendorf, Gutterman and Pinkas have reverse engineered the random number generator code from Windows. According to their paper, it is easy (O(1)) to compute a previous random number and possible (O(2^23) to predict the next one. (via The Inquirer)
Thirty Years Later: Lessons from the Multics Security Evaluation. Paul A. Karger, Roger R. Schell.
Analysis of the Linux Random Number Generator. Zvi Gutterman, Benny Pinkas, Tzachy Reinman.