17 Mistakes Microsoft Made in the Xbox Security System - Xbox-Linux edit / delete

How the (original) Xbox's freedom-denying bootloader was meant to work, and how it was broken. Repeatedly.

to cryptography reverse-engineering security xbox ... on 06 January 2015

Language-theoretic Security edit / delete

"The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks." Some interesting work, although it's obviously focussing on one class of problem...

to langsec language-design parser proof security verification ... on 03 January 2015

museum.media.org: Internet Talk Radio edit / delete

"Internet Talk Radio started broadcasting in 1993 as the first radio station on the Internet. As part of the museum.media.org effort to rescue some of our past work, we're also maintaining archives of early programs in their original state." Includes the "Hell's Bells" documentary that Joybubbles refers to in one of his recordings, and Cliff Stoll doing a presentation on "The Cuckoo's Egg".

to history phreaking podcasts radio retrotech security stoll ... on 23 November 2014

The Final Key - Hardware password manager with encryption edit / delete

A little USB device that pretends to be a serial port and a keyboard. Select an account using a terminal, push a button, and it types the password for it.

to electronics microcontroller password security usb ... on 24 August 2014

lcamtuf's blog: A bit more about american fuzzy lop edit / delete

Coverage-directed fuzzing tool, from the author of p0f et al. Easy to set up and play with.

to coverage coverage-directed fuzzing security testing ... on 05 August 2014

The SSL Co-operative edit / delete

Attempting to establish a CA on the cooperative model.

to ca certificate coop cryptography security ssl tls ... on 26 July 2014

System Hardening - The Chromium Projects edit / delete

A nice overview of all the application hardening facilities used on ChromiumOS.

to chromium container hardening linux sandbox security ... on 22 July 2014

Rami Rosen edit / delete

Some good presentations on Linux container facilities. (Horrid Javascript-based site, though.)

to container linux programming sandbox security ... on 11 July 2014

Using simple seccomp filters edit / delete

A worked example of setting up seccomp system call filters.

to linux seccomp security ... on 01 July 2014

Notes on Intel Microcode Updates edit / delete

Reverse-engineering Intel's microcode update mechanism.

to cpu intel microcode reverse-engineering security ... on 16 June 2014

Browser bookmarks: tasty+ | tasty= Log in | Export | Atom

Tags related to security

- security
 
1 + academia
1 + access-control
1 + acme
1 + ag0700
1 + ag0803
2 + ag0907
6 + amusements
2 + api
1 + architecture
1 + arduino
3 + arm
1 + authentication
1 + autoconf
1 + avr
1 + backdoor
1 + bell-labs
1 + bitcoin
1 + blockchain
1 + bounds-checking
1 + bounty
1 + browser
2 + buffer
2 + buffer-overflow
2 + bug
2 + bugs
1 + build-systems
2 + c
2 + c++
4 + ca
1 + camera
1 + capability
1 + capsicum
4 + ccc
4 + certificate
1 + certificates
1 + cesrg
1 + checking
1 + chromium
1 + chroot
1 + clang
1 + cloud
1 + code
3 + compiler
1 + conference
2 + container
1 + coop
1 + coverage
1 + coverage-directed
1 + coverity
2 + cpu
1 + crime
10 + crypto
12 + cryptography
1 + cs
1 + cypherpunks
1 + debian
1 + debugging
1 + dect
1 + design
1 + dh
2 + djb
1 + ebooks
1 + ecc
1 + economics
1 + el0805
1 + elective
3 + electronics
3 + encryption
2 + ers
1 + ethereum
1 + ethical-hacking
1 + ethics
3 + exploit
1 + firefox
1 + folk-song
4 + formal-methods
1 + freedom
3 + fuzzing
2 + gameboy
5 + games
1 + gcc
1 + git
1 + goto
2 + gpg
1 + gsm
2 + hardening
5 + history
1 + homebrew
1 + homeplugav
1 + http
1 + https
1 + intel
1 + ip
1 + ipsec
1 + javascript
1 + journalism
1 + jquery
1 + kerberos
3 + kernel
1 + keyboard
1 + keylogger
1 + langsec
2 + language-design
1 + letsencrypt
1 + library
1 + licensing
12 + linux
1 + livecd
1 + lts
1 + luks
1 + lvm
1 + mac
1 + memory-safety
1 + metaphors
2 + mgo
1 + microcode
4 + microcontroller
1 + mmc
1 + mod-ers
1 + monitoring
3 + nacl
5 + network
6 + networking
1 + noise
1 + notary
1 + ocaml
1 + openssh
2 + openssl
1 + org
2 + os
2 + overflow
2 + p2p
1 + packet
1 + pam
2 + papers
1 + parser
1 + password
1 + patterns
1 + pgp
2 + philosophy
2 + phone
1 + phreaking
1 + pki
1 + playstation
1 + podcasts
2 + politics
1 + porting
1 + prime
2 + privacy
1 + privilege-separation
4 + programming
1 + proof
1 + ps2
2 + python
1 + radio
1 + ramensky
1 + random
1 + research
3 + retrocomputing
1 + retrotech
6 + reverse-engineering
1 + risc
1 + rop
1 + safe
2 + safety
4 + sandbox
1 + scanner
1 + scm
1 + scotland
1 + sd
1 + search
2 + seccomp
1 + shuffle
1 + sni
1 + snowden
14 + software
6 + software-engineering
3 + ssh
12 + ssl
4 + static-analysis
1 + stoll
1 + strategy
1 + support
1 + syscall
1 + systems
1 + tandy
1 + tcp
1 + tea
6 + teaching
1 + telecom
5 + testing
14 + tls
2 + tor
1 + tunnel
4 + unix
1 + usability
1 + usable-security
2 + usb
1 + validation
1 + varan
3 + verification
1 + video
1 + vlc
1 + vpn
1 + vulnerabilities
1 + vulnerability
3 + web
1 + webcam
1 + whistleblowing
2 + wireless
1 + wpa
1 + writing
1 + x86
1 + xbox