|
You are here |
limitedresults.com | ||
| | | | |
danielmangum.com
|
|
| | | | | I recently acquired an ESP32-C3-DevKitC-02 module, and, as I tend to do, jumped right into reading about how the system boots and how the (pretty good!) tooling Espressif offers works. We have typically used QEMU in the RISC-V Bytes series, but getting our hands on physical hardware starts to make things feel a bit more real. In this first post on the ESP32, we'll do some basic setup and look at a simple custom bootloader. | |
| | | | |
www.riscure.com
|
|
| | | | | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them. | |
| | | | |
blog.quarkslab.com
|
|
| | | | | Join us in our journey into modern Android's Data Encryption at rest, in which we study how it works and assess how resistant it is against attackers having access to a range of high end software vulnerabilities. | |
| | | | |
blog.quarkslab.com
|
|
| | | In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other. | ||