🦞🌯 Lobster Roll

Thread

RISC-V Foundation Forms Security Committee (embedded-computing.com)

Stories related to "RISC-V Foundation Forms Security Committee" across the full archive.

RISC-V Foundation Forms Security Committee (embedded-computing.com)
Trusted Hart for Mobile RISC-V Security (arxiv.org)
[arXiv](https://arxiv.org/abs/2211.10299)
TKey is a risc-V computer in a USB-C case, that can run small security applications (dev.tillitis.se)
Hardware-based Full Disk Encryption (In)Security (www1.cs.fau.de)
DRAM security threat: Flipping Bits in Memory Without Accessing Them (github.com)
Paper is in the repo, slides: http://users.ece.cmu.edu/~omutlu/pub/dram-row-hammer_kim_talk_isca14.pdf
Tagged memory and minion cores in the lowRISC SoC (lowrisc.org)
As background, the lowRISC project aims to produce a fully open-source SoC using the RISC-V instruction set architecture and bring it to volume production. We've just released this document to describe in more detail our plans for tagged memory (not exactly the rebirth of the LISP machine, but has u...
Security vulnerabilities in BMW's ConnectedDrive (heise.de)
Anonabox Recalls 'Privacy' Routers for Security Flaws (wired.com)
lowRISC tagged memory preview release (FPGA-ready) (lowrisc.org)
CUFP 2013: Tom Hawkins: Redesigning the Computer for Security (youtube.com)
Security Considerations of the Intel x86 Management Engine (blog.invisiblethings.org)
Oral B Triumph Toothbrush with SmartGuideâ„¢ Security Advisory (gse-compliance.blogspot.com)
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale (media.ccc.de)
> [..] In this talk, we present several methods that make *the large scale security analyses of embedded devices* a feasible task. We implemented those techniques in a scalable framework that we tested on real world data. First, we collected a large number of firmware images from Internet reposi...
Stop the music! Booby-trapped song carjacked vehicles – security prof (theregister.co.uk)
Uncorrectable freedom and security issues on x86 platforms (mail.fsfeurope.org)
conorpp/u2f-zero - U2F USB token optimized for physical security, affordability, and style (github.com)
Freedom and privacy/security issues on mobile phones (replicant.us)
Survey of approaches for security verification of hardware/software systems (eprint.iacr.org)
After an intro to formal methods, it describes examples of hardware, software, and combined verifications of useful protection schemes. Recent work focuses more on HW/SW combined since it provides highest usability, security, and performance combination.
Using SDR to Take Control of Your Home Security System (hackaday.com)
Uncorrectable freedom and security issues on x86 platforms (decentralize.today)
Remote security exploit in all 2008+ Intel platforms (semiaccurate.com)
Verification of a practical, hardware, security architecture through static, info-flow analysis 2017 (cs.cornell.edu)
Intel's Management Engine is a security hazard, and users need a way to disable it (eff.org)
Understanding Pacemaker Systems Cybersecurity (blog.whitescope.io)
Rooting a Printer: From Security Bulletin to Remote Code Execution (tenable.com)
OSHUG Event #59 - CHERI CPU, Adding Security to Compilers, Trust & Provenance in Open Data (oshug.org)
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy (dnasec.cs.washington.edu)
Secret chips in replacement parts can completely hijack your phone’s security (arstechnica.com)
Titan in depth: Security in plaintext (cloudplatform.googleblog.com)
Librem 5 – A Security and Privacy Focused Phone – Purism (puri.sm)