security research repository of nathan andrew fain / cyphunk
Programmable Logic: What’s it to Ya? by Michael Barr from Embedded Systems Programming, June 1999 6 pages This document gives a basic overview of common programmable logic hardware: FPGA’s, CPLD’s and PLD. (Hold the mouse over links and acronyms to see their full definition or click to follow to their wikipedia entries). PLD In the…
Herding Hash Functions and the Nostradamus Attack (presentation slides) by John Kelsey and Tadayoshi Kohno 8 pages of text The paper describes an attack that would allow an attacker to massage (“herd”) an object to a point where it matches a hash value chosen by the attacker prior. What appears to be an important restriction…
Bugger The Debugger, Pre Interaction Debugger Code Execution By Brett Moore, CTO Security-Assessment.com. 10 pages of text, 3 of which are code. This paper describes a method to construct a binary which can run code before control is passed to a debugger. The method requires changing the PE header of an executable to reference your…