Explore >> Select a destination


You are here

secret.club
| | www.trailofbits.com
5.7 parsecs away

Travel
| | [AI summary] The text discusses the security considerations for using AWS Nitro Enclaves, covering topics such as secure randomness, side-channel attacks, memory management, and time sources. It emphasizes the importance of proper configuration and mitigation strategies to protect against potential vulnerabilities.
| | prog.world
4.9 parsecs away

Travel
| | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities.
| | gamozolabs.github.io
5.0 parsecs away

Travel
| | I blog about random things security, everything is broken, nothing scales, shared memory models are flawed.
| | github.com
24.1 parsecs away

Travel
| :electron: ?? The easiest way to get started with Electron - Contributors to electron/fiddle