Evilsploit – A Universal Hardware Hacking
نویسندگان
چکیده
In general, hardware hacking is about to understand the inner working mechanism of hardware and defeat its security protection in order to harness as many as the resources of hardware together with its collaborative software. In most of the time, the hardware hacking process is started from reversing process. From hardware point of view, reversing in static way includes uncover the schematic and disassemble the binary. On the other hand, reversing in dynamic way includes to find a way to debug the hardware and to fuzz it accordingly.
منابع مشابه
GDF Briefing 2 - world cafe
In these spaces people access networked, digital design and fabrication tools and, it is argued, can therefore make almost anything they wish. Ideas, designs, experiences and viewpoints are shared between spaces through on-line social media. Makerspaces are globally connected. Indeed, observers and participants consider makerspaces to connect to and express materially various broader social mov...
متن کاملOpen Pattern project: a comprehensive modular routing platform
The last developments of the home gateways, DSL-boxes, off-the-shelf wireless routers, wireless communities initiatives have brought a great number of network hardware to the home. These different developments have been followed by different initiatives of "hacking the box" to be able to flash this specific hardware with open-source firmware resulting from the contribution of several open-sourc...
متن کاملSecure communication in microcomputer bus systems for embedded devices
The protection of the microcomputer bus system in embedded devices is essential to prevent eavesdropping and the growing number of todays hardware hacking attacks. This contribution presents a hardware solution to ensure microcomputer bus systems via the Tree Parity Machine Rekeying Architecture (TPMRA). For this purpose a scalable TPMRA IP-core is designed and implemented in order to meet adap...
متن کاملAttacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software
With the emergence of widely available hardware and software tools for GSM hacking, the security of cellular networks is threatened even by script kiddies. In this paper we present four different attacks in GSM networks, using commodity hardware as well as open source and freely available software tools. All attacks are performed using a common DVB-T TV tuner, which is used as a sniffer for the...
متن کاملExposing the scaffolding of digital instruments with hardware-software feedback loops
The implementation of digital musical instruments is often opaque to the performer. Even when the relationship between action and sound is readily understandable, the internal hardware or software operations that create that relationship may be inaccessible to scrutiny or modification. This paper presents a new approach to digital instrument design which lets the performer alter and subvert the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017