Full Disclosure mailing list archives

Re: Using hardware to attack software


From: Valdis.Kletnieks () vt edu
Date: Tue, 27 Dec 2011 19:20:14 -0500

On Tue, 27 Dec 2011 15:52:50 PST, coderman said:

Password recovery and information disclosure attacks involving
hardware resources are under-represented within the security industry.
With a growing number of attackers moving beyong pure cyber attack
scenarios into blended hardware on flesh methods combined with
automated software strategies to fully realize world class exploit
trees for maximum effect, this hardware involved wetware attack can be
ignored no longer. This paper introduces and details a wide variety
methods from simple brass knuckles or fist packs to elaborate mental
models of exploitation implying pain to the genitals, elaborate set
pieces, and trained performances. we show how this taxonomy of
coercion can be leveraged to extract passwords and obtain information
with great efficiency and efficacy according to a framework we put
forth...

I just won enough on Buzzword Bingo to retire.  :)


Attachment: _bin
Description:

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: