Full Disclosure mailing list archives
Using hardware to attack software
From: "Forristal, Jeff" <jeff.forristal () intel com>
Date: Fri, 23 Dec 2011 22:27:53 +0000
Folks on this list may be interested in a recent whitepaper talking about types of attacks that leverage PC hardware to attack local software. Hardware reflected injection, anyone? Paper is available at http://www.forristal.com/material/Forristal_Hardware_Involved_Software_Attacks.pdf Thanks, and happy holidays! - Jeff
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Using hardware to attack software Forristal, Jeff (Dec 24)
- Re: Using hardware to attack software Gage Bystrom (Dec 24)
- Re: Using hardware to attack software Forristal, Jeff (Dec 29)
- Re: Using hardware to attack software Gage Bystrom (Dec 27)
- Re: Using hardware to attack software coderman (Dec 27)
- Re: Using hardware to attack software Forristal, Jeff (Dec 29)
- Re: Using hardware to attack software Gage Bystrom (Dec 24)
- Re: Using hardware to attack software coderman (Dec 27)
- Re: Using hardware to attack software Valdis . Kletnieks (Dec 27)