Explore >> Select a destination


You are here

limitedresults.com
| | yifan.lu
1.8 parsecs away

Travel
| | For the past couple of months, I have been trying to extract the hardware keys from the PlayStation Vita. I wrote a paper describing the whole process with all the technical details, but I thought I would also write a more casual blog post about it as well. Consider this a companion piece to the paper where I will expand more on the process and the dead ends than just present the results. In place of technical accuracy, I will attempt to provide more intuitive explanations and give background information...
| | voidstarsec.com
2.4 parsecs away

Travel
| | Introduction to Fault Injection Attacks
| | danielmangum.com
3.3 parsecs away

Travel
| | Isolating sensitive data and operations is a fundamental issue in computing. Ideally, we want to minimize the possibility of a software defect compromising the security of a device. However, in order for the software we write to be useful, it typically needs to interact with that sensitive data in some form or fashion. So how do we interact with sensitive data without being able to access it? The answer is that we bring only the operations that must access the sensitive data closer to the data, then force all other software to invoke those operations via some sort of interface.
| | gamingbolt.com
32.4 parsecs away

Travel
| The highly anticipated sequel to Kojima Productions' acclaimed action-adventure launches on June 26th for PlayStation 5.