Full Disclosure mailing list archives

Re: Using hardware to attack software


From: coderman <coderman () gmail com>
Date: Tue, 27 Dec 2011 15:52:50 -0800

On Fri, Dec 23, 2011 at 2:27 PM, Forristal, Jeff
<jeff.forristal () intel com> wrote:
Folks on this list may be interested in a recent whitepaper talking about
types of attacks that leverage PC hardware to attack local software.

i look forward to the next installment:

"""
'Hardware involved wetware attacks'

Abstract

Password recovery and information disclosure attacks involving
hardware resources are under-represented within the security industry.
With a growing number of attackers moving beyong pure cyber attack
scenarios into blended hardware on flesh methods combined with
automated software strategies to fully realize world class exploit
trees for maximum effect, this hardware involved wetware attack can be
ignored no longer. This paper introduces and details a wide variety
methods from simple brass knuckles or fist packs to elaborate mental
models of exploitation implying pain to the genitals, elaborate set
pieces, and trained performances. we show how this taxonomy of
coercion can be leveraged to extract passwords and obtain information
with great efficiency and efficacy according to a framework we put
forth...
"""

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: