All Questions
14 questions
1vote
1answer
268views
Are there any existing JTAG (hardware debugging) based malware detection systems, and if not, why?
JTAG System software debug support is for many software developers the main reason to be interested in JTAG. Many silicon architectures such as PowerPC, MIPS, ARM, x86 built an entire software debug, ...
12votes
3answers
5kviews
Ring -3 exploits and existence of other rings
Concept of Rings Rings were introduced in the forerunner of UNIX, Multics, and had 8 rings for reading, writing, executing and calling (I don't quite understand why it needed 8 rings to do this, if ...
3votes
2answers
785views
Why must Meltdown use probe array?
This is code snippet of Meltdown assembly language code: 1. ; rcx = kernel address, rbx = probe array 2. xor rax, rax 3. retry: 4. mov al, byte [rcx] 5. shl rax, 0xc 6. jz retry 7. mov rbx, ...
4votes
1answer
1kviews
Is it risky to use an untrusted keyboard?
Suppose you're buying a new keyboard (say USB-wired, but consider Bluetooth connected as well) from Ebay. Is it risky to use that keyboard in a sense that it could be more than just a keyboard? ...
6votes
1answer
1kviews
Is Intel i3 CPU affected by the Intel ME vulnerability?
Hello I have an Intel® Core™ i3-2328M CPU @ 2.20GHz computer processor (I think Sandy Bridge). https://ark.intel.com/products/70927/Intel-Core-i3-2328M-Processor-3M-Cache-2_20-GHz I have heard about ...
-4votes
1answer
2kviews
Webcam hack while laptop is offline
Well, basically the subject says for it self. Is it actually possible to hack the webcam of a PC that is turned off? We're not talking about an infected machine. For example, by remotely turning ...
11votes
1answer
680views
Which memory modules are known to be vulnerable to or secure against Rowhammer/Flip Feng Shui?
Many memory modules from different manufacturers have been tested for vulnerability to the Rowhammer exploit. However, some researchers have anonymised their results, possibly for responsible ...
5votes
2answers
621views
"Memory Sinkhole" attack and virtual machines?
Recently a design flaw in some Intel X86 processors was revealed at Blackhat. The flaw enables malicious code to gain access to SMM. The flaw can be exploited by an attacker with administrator ...
7votes
1answer
924views
Realistic: Exploiting a computer on BIOS/ hardware level in less than an hour? (Infinite preparation time)
I wonder how hard it it to infect a laptop or netbook in 60 minutes or less in a way the victim cannot easily clean their machine by wiping hard disk drives. Let's assume the following: The attacker ...
1vote
2answers
1kviews
Transmitting malicious code over audio speakers
In a post that reads like science-fiction, a security researcher claims that malicious code was being passed between computers. A few quotes: ... "badBIOS," as Ruiu dubbed the malware, has ...
25votes
2answers
2kviews
Aviation security - Lessons to learn from PlaneSploit
A somewhat related question has already been asked (What would one need to do in order to hijack a satellite?), only at a more abstract level. Now we have a presentation by Hugo Teso from n.runs AG ...
6votes
1answer
1kviews
Epson Projector security threats
I have an EPSON PROJECTOR (model EB-824H) And I would like to use it in our company. As I know (but not sure) this kind of projector has no WIFI,no network card and there is no HD in this PROJECTOR It ...
13votes
1answer
2kviews
SCADA / PLC exploit code was released in metasploit. Now what?
Wired reports that there are many security issues with Programmable Logic Controllers (PLCs) and now there is an easy to use tool to scan and detect vulnerabilities. They say it's so easy, the ...
17votes
2answers
3kviews
Protecting cellphones from USB attacks (a.k.a. Juice Jacking)
We have several smartphone with encrypted data on them (BES, iPhone, Android) and want to prevent an unauthorized person from downloading information from the device via USB. The visual assumption ...