Author: cyphunk
-
Workflow for hardware security analysis
My workflow for threat weighted hardware analsysis or research has changed with time. Slight uniformaty has found its way into my routine which is helpful for cross referencing knowledge between projects. With the curse of multitasking projects a constant this also reduces the time required to switch between projects or pickup on an old project. I’d…
-
The Subterfugue process sandbox
These are tools that let one run a process and, in a sense, selectively debug by telling the tool to perform analysis when conditions are met in the kernel, such as when a certain argument is sent to sendto() one could replace it on the stack with their own value. You could write your own…
-
Finding entropy in binary files
Update: added routine to print out hex data for blocks where entropy passes a given threshold. Update: GUI display of graph (using TK) was not working on my system. Code now saves an image of the results in addition to attempting to display with GUI. Update: These days I use a slightly modified libdisorder and…
-
Formal aspects of mobile code security – Chapter 5
Formal aspects of mobile code security – Chapter 5 PhD thesis for Richard Drews Dean 23 page chapter. Incomplete: Need to discuss how the author discovered attacks. Need to check my description using the detailed equations provided. I must illustrate the attack methods. The interest in this thesis is due to its reference in Heard…
-
SHA-1 Illustrated
By Nathan Fain Incomplete: must create detailed diagram for compression functions. The following simplifies the specification of SHA-1 in an easy to digest form. First we will cover the general structure of the algorithm. Detail of the expansion and compression routines are covered separately. First we start with a message. The message is padded and…