Explore >> Select a destination


You are here

www.riscure.com
| | blog.quarkslab.com
2.9 parsecs away

Travel
| | This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3.
| | raelize.com
2.2 parsecs away

Travel
| | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training.
| | dayzerosec.com
5.7 parsecs away

Travel
| | Part one: https://dayzerosec.com/blog/2023/04/17/reversing-the-amd-secure-processor-psp.html This is a follow-up part 2 to my previous post on the AMD Secure Processor (formerly known as the Platform Security Processor or "PSP"). In that post, I mentioned that the Cryptographic Co-Processor (CCP) is an essential component of how the PSP functions. It's primarily responsible for hardware-accelerated cryptography, but it's also used as a Direct Memory Access (DMA) copy engine for doing mass copy
| | michaelneuper.com
27.7 parsecs away

Travel
| A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.