Shared August 28, 2018
This talk will demonstrate what everyone has long feared but never proven: there are hardware backdoors in some x86 processors, and they're buried deeper than we ever imagined possible. While this research specifically examines a third-party processor, we use this as a stepping stone to explore the feasibility of more widespread hardware backdoors.
By Christopher Domas
Full Abstract & Presentation Materials: https://www.blackhat.com/us-18/briefi...
Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Don't Talk to the Police
DEFCON 19: The Art of Trolling (w speaker)
Scammed on ebay... Testing the 56 CORE system!
Sega Saturn CD - Cracked after 20 years
SpiegelMining – Reverse Engineering von Spiegel-Online (33c3)
You’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS ICS 2018]
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
How the mysterious dark net is going mainstream | Jamie Bartlett
SirenJack: Cracking a 'Secure' Emergency Warning Siren System
Intel is in serious trouble. ARM is the Future.
Exploiting the Tiltman Break - Computerphile
Here's What Happens When an 18 Year Old Buys a Mainframe
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev
DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86
How Smartcard Payment Systems Fail
I'll Let Myself In: Tactics of Physical Pen Testers
27c3: Reverse Engineering the MOS 6502 CPU (en)