Side Channel Attacks
An interesting read on side channel attacks: “The second story was about USB devices. Basically, they plugged a very precise voltmeter into an USB port and started recording the very small variations...
View ArticleBreaking Full-Disk Encryption Using FireWire
There have been a number of proof-of-concept hacks using IEEE1394 devices’ DMA to elevate privileges on a host machine. The most useful application of this technique is breaking into machines that use...
View ArticleFROST: Forensic Recovery Of Scrambled Telephones
A ready to go cold boot attack for a Galaxy Nexus! Your Android PIN does not protect you. We present FROST, a tool set that supports the forensic recovery of scrambled telephones. To this end we...
View Article
More Pages to Explore .....