|
You are here |
www.righto.com | ||
| | | | |
www.pagetable.com
|
|
| | | | | ||
| | | | |
floooh.github.io
|
|
| | | | | [AI summary] The text provides an in-depth look at the development and intricacies of a Z80 CPU emulator, focusing on cycle-accurate timing, pin behavior, and various improvements over previous versions. It details the emulator's architecture, including the handling of CPU pins, interrupt protocols, and the differences between the new and old emulator implementations. The text also discusses testing methodologies, the impact of cycle-accurate emulation on system behavior, and specific improvements in Amstrad CPC emulation. Additionally, it touches on the author's personal website and blog, highlighting the focus on programming and emulation topics. | |
| | | | |
www.reenigne.org
|
|
| | | | | [AI summary] The provided text is a detailed discussion of the 8086/8088 microcode, including various user interactions and technical insights. It covers topics such as microcode disassembly, interrupt handling, register operations, and the structure of the microcode ROM. Key points include the role of the group decoder, the handling of prefixes like REP, and the logic for determining microcode jumps. The text also references Andrew Jenner's disassembly of the microcode and mentions ongoing emulator development efforts. | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key. | ||