Size: a a a

2019 December 05

Д

Дима Ерофеев in HWV ⟼ R&D
его пытаемся использовать в своих модулях
источник
2019 December 07

x

xairy in HWV ⟼ R&D
источник

S

Sergey in HWV ⟼ R&D
Кажется патч для макос не полный, интересно все так же осталось?
источник

x

xairy in HWV ⟼ R&D
Sergey
Кажется патч для макос не полный, интересно все так же осталось?
Ты про который патч?
источник

x

xairy in HWV ⟼ R&D
Функ. поинтеры они вроде ксорят с кукой, но iommu домен на все девайсы общий так и есть
источник

S

Sergey in HWV ⟼ R&D
Судя по презе они только два поинтера ксорят
источник
2019 December 08

T

Tsifrovoy in HWV ⟼ R&D
Кто хорошо разбирается в применении методов виртуализации для дебага, подскажите, почему настолько мало ресурсов риалтайм дебаге под наблюдением операционных систем как таковых ?
источник

T

Tsifrovoy in HWV ⟼ R&D
источник

A

ARCHANGEL in HWV ⟼ R&D
ну как бы реализации этого всего непростые
источник

T

Tsifrovoy in HWV ⟼ R&D
ARCHANGEL
ну как бы реализации этого всего непростые
У тебя есть хотя какие-то наводки, мысли, научные теоретические материалы на эту тему ? Круто было бы услышать
источник

A

ARCHANGEL in HWV ⟼ R&D
Tsifrovoy
У тебя есть хотя какие-то наводки, мысли, научные теоретические материалы на эту тему ? Круто было бы услышать
моих личных наработок нет, всё общедоступное на паблике, с гугла
источник

T

Tsifrovoy in HWV ⟼ R&D
Xybersecurity news, valuable resources, ideas and more

@sekurnoc
источник

ЗБ

Зафод Библброкс in HWV ⟼ R&D
Microcontroller Firmware Recovery Using Invasive Analysis

The internet-of-things revolution is here and it is here to stay. From internet-enabled cat boxes to Wi-Fi-controlled stoves, smart devices permeate our lives at an ever-increasing increasing pace. The rush to get items like the next greatest internet-connected wine bottle to market coupled with the lack of regulatory oversight frequently puts system security on the back burner; a feature to be “added on later.” Rather than focus on product security, many manufacturers and integrators choose instead to disable hardware debugging functionality and enable firmware readback protection to make vulnerability discovery more challenging.

Once these microcontroller interfaces are locked, there is usually no manufacturer-prescribed way to unlock them without also wiping out the firmware. Historically, there have been ways to bypass these lockouts, often because the manufacturer doesn’t realize how attackers can abuse certain functionality. For instance, manufacturers sometimes unwittingly allow readback of firmware through faulty implementations of the hashing algorithms used to validate flashing at the factory. If a debugging interface is available, researchers can sometimes extract the firmware through side-effect analysis. There are more involved attacks such as voltage or clock glitching using toolkits, like the venerable ChipWhisperer, that inject faults to try to trip up internal subsystem behavior during critical operations.

Another class of attacks, referred to as invasive,” requires physical access to the silicon dies inside of the package while maintaining chip functionality. These are often dismissed as infeasible for the average security researcher due to the perceived difficulty and expense of IC decapsulation. The goal of this guide is to demonstrate that researchers don’t need a multi-million dollar lab to perform practical invasive attacks against a typical microcontroller and to detail a novel method of utilizing safer acid mixtures at or below room temperature to decapsulate semiconductor packages that utilize copper interconnects and wires. At the end, I will cover common mitigations employed and how to spot them.

https://duo.com/blog/microcontroller-firmware-recovery-using-invasive-analysis

#hw #reverse #firmware  #ic
источник

DB

Danil Borchevkin in HWV ⟼ R&D
Заказывали один раз сколку прошивки чтением с кристалла. Норм, все зашло=)) Скалывали ATMega какую то
источник

A

Alexander in HWV ⟼ R&D
Зафод Библброкс
Microcontroller Firmware Recovery Using Invasive Analysis

The internet-of-things revolution is here and it is here to stay. From internet-enabled cat boxes to Wi-Fi-controlled stoves, smart devices permeate our lives at an ever-increasing increasing pace. The rush to get items like the next greatest internet-connected wine bottle to market coupled with the lack of regulatory oversight frequently puts system security on the back burner; a feature to be “added on later.” Rather than focus on product security, many manufacturers and integrators choose instead to disable hardware debugging functionality and enable firmware readback protection to make vulnerability discovery more challenging.

Once these microcontroller interfaces are locked, there is usually no manufacturer-prescribed way to unlock them without also wiping out the firmware. Historically, there have been ways to bypass these lockouts, often because the manufacturer doesn’t realize how attackers can abuse certain functionality. For instance, manufacturers sometimes unwittingly allow readback of firmware through faulty implementations of the hashing algorithms used to validate flashing at the factory. If a debugging interface is available, researchers can sometimes extract the firmware through side-effect analysis. There are more involved attacks such as voltage or clock glitching using toolkits, like the venerable ChipWhisperer, that inject faults to try to trip up internal subsystem behavior during critical operations.

Another class of attacks, referred to as invasive,” requires physical access to the silicon dies inside of the package while maintaining chip functionality. These are often dismissed as infeasible for the average security researcher due to the perceived difficulty and expense of IC decapsulation. The goal of this guide is to demonstrate that researchers don’t need a multi-million dollar lab to perform practical invasive attacks against a typical microcontroller and to detail a novel method of utilizing safer acid mixtures at or below room temperature to decapsulate semiconductor packages that utilize copper interconnects and wires. At the end, I will cover common mitigations employed and how to spot them.

https://duo.com/blog/microcontroller-firmware-recovery-using-invasive-analysis

#hw #reverse #firmware  #ic
Красотища, но оптика стоит запредельных денег.
Barsmonster по аукционам со скидками лет 7 собирал.
источник

A

Alexander in HWV ⟼ R&D
И оптический мелкоскоп разве видит зашита во Flash логическая единица или ноль?
источник

AB

Andy Brakhma in HWV ⟼ R&D
Danil Borchevkin
Заказывали один раз сколку прошивки чтением с кристалла. Норм, все зашло=)) Скалывали ATMega какую то
и сколько, ежли не секрет, стоит такого рода услуга?
источник

DB

Danil Borchevkin in HWV ⟼ R&D
5 лет назад делали за 30к
источник

DB

Danil Borchevkin in HWV ⟼ R&D
Причем там было условие на определенную ревизию микросхем, которая определяла тип и материал проволки для разварки
источник

DB

Danil Borchevkin in HWV ⟼ R&D
Вроде с алюминиевой проволкой отказывались делать
источник