120
22 Jan 2015
Don't Copy That Floppy
Andrew on weak references and Wolf on physical-access malware like Thunderstrike.
Links:
- The Swift Programming Language: Automatic Reference Counting
- Thunderstrike 31c3 « Trammell Hudson’s Projects
- Thunderstrike Proof-of-Concept Attack Serious, but Limited « TidBITS
- World’s first (known) bootkit for OS X can permanently backdoor Macs « Ars Technica
- De Mysteriis Dom Jobsivs: Mac EFI Rootkits (PDF)
- DMA attack « Wikipedia
- The MacHax Best Hack Contest 2002 « TidBITS
- Evil Maid goes after TrueCrypt! « The Invisible Things Lab’s blog
- You Don’t Want XTS « Quarrelsome
- Secret of Intel Management Engine by Igor Skochinsky « Slideshare
- Cold boot attack « Wikipedia
- FROST: Forensic Recovery Of Scrambled Telephones « IT-Sicherheitsinfrastrukturen (Informatik 1)
- Evidence Search and Analysis Software for Digital Forensic Investigations « Belkasoft
- Memory controller, Scrambling « Wikipedia
- Apple keyboard firmware hack demonstrated « SemiAccurate