by David Boreham | Jul 27, 2018 | Security
I noticed some amazing work published earlier this week by researches from EUROCOM, and to be presented at ACM CCS 2018. They were able to recover encryption keys from an IoT type SoC from noise leaked onto the chip’s Bluetooth radio’s RF output. This...
by Bozemanpass Staff | Feb 26, 2018 | Security
In our Cyber Security Consulting Practice we get deep into the authentication weeds helping clients ensure their authentication systems are up to date with the latest best practices. So it was with interest that we saw this recent post by Ian Maddox on that very...
by David Boreham | Jan 18, 2018 | Security
One of those “war stories to tell your grandkids”. David Wragg details his investigation into seemingly random segmentation faults on the Cloudflare Blog. These amazingly enough turned out to be due to a microcode bug in a specific Intel CPU design....
by David Boreham | Jan 11, 2018 | Performance, Security
When the Meltdown and Spectre vulnerabilities were first rumored last year I wondered about something: we’re familiar here with the CPU’s hardware performance counters through our work on software performance analysis and optimization. Briefly, these...
by Bozemanpass Staff | Jan 11, 2018 | Security
Raphael S. Carvalho, a.k.a. utroz has written a nice article showing step by step with ‘C’ source code how an exploit for the Meltdown speculative execution vulnerability would work. has also written a Meltdown vulnerability checker works by attempting to...
Recent Comments