|
You are here |
www.riscure.com | ||
| | | | |
blog.quarkslab.com
|
|
| | | | | This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3. | |
| | | | |
raelize.com
|
|
| | | | | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training. | |
| | | | |
dayzerosec.com
|
|
| | | | | Part one: https://dayzerosec.com/blog/2023/04/17/reversing-the-amd-secure-processor-psp.html This is a follow-up part 2 to my previous post on the AMD Secure Processor (formerly known as the Platform Security Processor or "PSP"). In that post, I mentioned that the Cryptographic Co-Processor (CCP) is an essential component of how the PSP functions. It's primarily responsible for hardware-accelerated cryptography, but it's also used as a Direct Memory Access (DMA) copy engine for doing mass copy | |
| | | | |
michaelneuper.com
|
|
| | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | ||