Explore >> Select a destination


You are here

blog.thalium.re
| | blog.quarkslab.com
2.4 parsecs away

Travel
| | In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.
| | comsecuris.com
2.2 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | www.riscure.com
1.4 parsecs away

Travel
| | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them.
| | blog.nelhage.com
21.7 parsecs away

Travel
| tl;dr "Transparent Hugepages" is a Linux kernel feature intended to improve performance by making more efficient use of your processor's memory-mapping hardware. It is enabled ("enabled=always") by default in most Linux distributions. Transparent Hugepages gives some applications a small performance improvement (~ 10% at best, 0-3% more typically), but can cause significant performance problems, or even apparent memory leaks at worst. To avoid these problems, you should set enabled=madvise on your server...