Skip to main content

All Questions

Tagged with
1vote
1answer
268views

Are there any existing JTAG (hardware debugging) based malware detection systems, and if not, why?

JTAG System software debug support is for many software developers the main reason to be interested in JTAG. Many silicon architectures such as PowerPC, MIPS, ARM, x86 built an entire software debug, ...
J.Todd's user avatar
  • 1,310
12votes
3answers
5kviews

Ring -3 exploits and existence of other rings

Concept of Rings Rings were introduced in the forerunner of UNIX, Multics, and had 8 rings for reading, writing, executing and calling (I don't quite understand why it needed 8 rings to do this, if ...
LTPCGO's user avatar
  • 1,065
3votes
2answers
785views

Why must Meltdown use probe array?

This is code snippet of Meltdown assembly language code: 1. ; rcx = kernel address, rbx = probe array 2. xor rax, rax 3. retry: 4. mov al, byte [rcx] 5. shl rax, 0xc 6. jz retry 7. mov rbx, ...
M. Kalter's user avatar
4votes
1answer
1kviews

Is it risky to use an untrusted keyboard?

Suppose you're buying a new keyboard (say USB-wired, but consider Bluetooth connected as well) from Ebay. Is it risky to use that keyboard in a sense that it could be more than just a keyboard? ...
a_guest's user avatar
6votes
1answer
1kviews

Is Intel i3 CPU affected by the Intel ME vulnerability?

Hello I have an Intel® Core™ i3-2328M CPU @ 2.20GHz computer processor (I think Sandy Bridge). https://ark.intel.com/products/70927/Intel-Core-i3-2328M-Processor-3M-Cache-2_20-GHz I have heard about ...
Hexagon's user avatar
-4votes
1answer
2kviews

Webcam hack while laptop is offline

Well, basically the subject says for it self. Is it actually possible to hack the webcam of a PC that is turned off? We're not talking about an infected machine. For example, by remotely turning ...
greenzacc's user avatar
11votes
1answer
680views

Which memory modules are known to be vulnerable to or secure against Rowhammer/Flip Feng Shui?

Many memory modules from different manufacturers have been tested for vulnerability to the Rowhammer exploit. However, some researchers have anonymised their results, possibly for responsible ...
l0b0's user avatar
  • 3,045
5votes
2answers
621views

"Memory Sinkhole" attack and virtual machines?

Recently a design flaw in some Intel X86 processors was revealed at Blackhat. The flaw enables malicious code to gain access to SMM. The flaw can be exploited by an attacker with administrator ...
user83822's user avatar
7votes
1answer
924views

Realistic: Exploiting a computer on BIOS/ hardware level in less than an hour? (Infinite preparation time)

I wonder how hard it it to infect a laptop or netbook in 60 minutes or less in a way the victim cannot easily clean their machine by wiping hard disk drives. Let's assume the following: The attacker ...
ALittleBitOfParanoia's user avatar
1vote
2answers
1kviews

Transmitting malicious code over audio speakers

In a post that reads like science-fiction, a security researcher claims that malicious code was being passed between computers. A few quotes: ... "badBIOS," as Ruiu dubbed the malware, has ...
Hooked's user avatar
25votes
2answers
2kviews

Aviation security - Lessons to learn from PlaneSploit

A somewhat related question has already been asked (What would one need to do in order to hijack a satellite?), only at a more abstract level. Now we have a presentation by Hugo Teso from n.runs AG ...
Deer Hunter's user avatar
6votes
1answer
1kviews

Epson Projector security threats

I have an EPSON PROJECTOR (model EB-824H) And I would like to use it in our company. As I know (but not sure) this kind of projector has no WIFI,no network card and there is no HD in this PROJECTOR It ...
La Luna's user avatar
13votes
1answer
2kviews

SCADA / PLC exploit code was released in metasploit. Now what?

Wired reports that there are many security issues with Programmable Logic Controllers (PLCs) and now there is an easy to use tool to scan and detect vulnerabilities. They say it's so easy, the ...
makerofthings7's user avatar
17votes
2answers
3kviews

Protecting cellphones from USB attacks (a.k.a. Juice Jacking)

We have several smartphone with encrypted data on them (BES, iPhone, Android) and want to prevent an unauthorized person from downloading information from the device via USB. The visual assumption ...
makerofthings7's user avatar

close