«
Expand/Collapse
35 items tagged "processor"
Related tags:
buffer overflow [+],
hacks [+],
route [+],
cisco ios [+],
vulnerability [+],
seh [+],
route switch processor [+],
free software updates [+],
cisco security advisory [+],
cisco security [+],
cisco carrier [+],
unicode [+],
u seh [+],
processor version [+],
m3u file [+],
bit [+],
arbitrary code execution [+],
software level [+],
ralf philipp [+],
processor architecture [+],
open source solutions [+],
misc [+],
memory corruption [+],
gsm [+],
file [+],
exploits [+],
creating [+],
computing [+],
classic [+],
chaos communication congress [+],
bit computer [+],
baseband [+],
abstract processor [+],
abstract [+],
Hardware [+],
z80 [+],
yutaka [+],
week [+],
wallet [+],
this [+],
thinking cap [+],
thinking [+],
stm [+],
service vulnerability [+],
security issues [+],
script faq [+],
script [+],
scissors [+],
saito [+],
s line [+],
runtime [+],
route processor [+],
robots [+],
robot [+],
reconfigurable processors [+],
raspberry [+],
quinn dunki [+],
quantum [+],
proprietary processor [+],
processor works [+],
processor script [+],
processor cores [+],
prime [+],
pololu [+],
pcs [+],
pcb [+],
pc projects [+],
pc [+],
payment processor [+],
payment [+],
paper [+],
news [+],
netbooks [+],
motorola 6809 [+],
microcontrollers [+],
michael dornisch [+],
matthew arnoff [+],
matt porter [+],
matt bunting [+],
matt [+],
macbook [+],
linux environment [+],
linux [+],
line sensors [+],
instruction [+],
hexapod [+],
heat sinks [+],
heat [+],
hardware hacks [+],
hardware division [+],
great solutions [+],
dominik meyer tags [+],
division operations [+],
division [+],
discrete [+],
dell mini [+],
dave jones [+],
core processor [+],
core [+],
computer [+],
commodore 64 [+],
chaos communication camp [+],
celsius [+],
cap [+],
bunting [+],
buffer overflow vulnerability [+],
breadboarding [+],
breadboard [+],
bogdan marinescu [+],
atom [+],
arm processor [+],
apple tv [+],
apple ipad [+],
apple computers [+],
andrew [+],
air [+],
abstract thinking [+],
Software [+],
Rasberry [+],
ARM [+],
subtitle [+]
-
-
9:01
»
Hack a Day
Often when we see projects using embedded Linux we think of them as not being hardware hacks. But this is a horse of an entirely different color. [Matt Porter] is leveraging a little known feature to directly access a 6502 processor from inside a Linux environment. In other words, this hack lets you write code [...]
-
-
13:01
»
Hack a Day
At the center of that green PCB is a tiny little processor with way too many cores. It’s the GA144 which was taken for a test-drive on a breadboard by [Andrew Back]. We saw a multi-core Kickstarter project last month. This will cost a lot less and get you more than twice the number of [...]
-
-
13:01
»
Hack a Day
This 32-bit computer is a project [Bogdan Marinescu] built as a contest entry. Sadly he didn’t win, but he did do an excellent job of documenting the build. Having seen several other home built PC projects we’re familiar with the challenges that go into such a thing, and he found some great solutions to each [...]
-
-
16:47
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP-4G and RSP-8G), Route Switch Processor 440 (RSP440), and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.
-
16:47
»
Packet Storm Security Misc. Files
Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP-4G and RSP-8G), Route Switch Processor 440 (RSP440), and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.
-
-
17:01
»
Hack a Day
[Michael Dornisch] was surprised to find that the main processor of the Raspberry Pi reaches about 56 degrees Celsius (about 133 degrees F) while streaming video over the network. He thought it might help the longevity of the device if he was able to cool things off a bit. But why stop with just the [...]
-
-
17:28
»
Packet Storm Security Advisories
Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.
-
17:28
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.
-
17:28
»
Packet Storm Security Misc. Files
Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.
-
-
21:32
»
SecDocs
Authors:
Dominik Meyer Tags:
hardware hacking Event:
Chaos Communication Camp 2011 Abstract: The talk will give the audience an introduction to the world of runtime reconfigurable processors. The current state of the art in processor performance improvements are multicore-processor systems. These systems offer a number of homogeneous and static processor cores for the parallel distribution of computational tasks. Another approach are reconfigurable processors or reconfigurable multicore processor systems, which can adapt to program needs on the fly during runtime. This is done through swapping different kinds of functional units in and out or by giving the processor freely available space for hardware configuration. After years of just being a research field such systems can be seen in the wild. For example the HC1 architecture from Convey or the combination of an Intel Atom processor with an Altera FPGA. The talk will introduce the audience to the field of reconfigurable processors. It will classify the different kinds of such processors and describe some architectures briefly. At the end general security issues are explained.
-
-
21:48
»
SecDocs
Authors:
Ralf-Philipp Weinmann Tags:
GSM Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Attack scenarios against mobile phones have thus far concentrated on the application processor. The operating systems running on these processors are getting hardened by vendors as can be seen in the case of Apple's iOS -- the current release uses data execution prevention and code signing. In contrast, the GSM stack running on the baseband processor is neglected. The advent of open-source solutions such as OpenBSC and OpenBTS for running GSM base stations is a game-changer: Malicious base stations are not within the attack model assumed by the GSMA and ETSI. This talks explores the viability of attacks against the baseband processor of GSM cellular phones. Results presented will be the first over-the-air memory corruption exploitation of bugs in a number of widespread GSM stacks that that allow for remote code execution.
-
21:48
»
SecDocs
Authors:
Ralf-Philipp Weinmann Tags:
GSM Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Attack scenarios against mobile phones have thus far concentrated on the application processor. The operating systems running on these processors are getting hardened by vendors as can be seen in the case of Apple's iOS -- the current release uses data execution prevention and code signing. In contrast, the GSM stack running on the baseband processor is neglected. The advent of open-source solutions such as OpenBSC and OpenBTS for running GSM base stations is a game-changer: Malicious base stations are not within the attack model assumed by the GSMA and ETSI. This talks explores the viability of attacks against the baseband processor of GSM cellular phones. Results presented will be the first over-the-air memory corruption exploitation of bugs in a number of widespread GSM stacks that that allow for remote code execution.
-
-
10:20
»
Hack a Day
Put on that abstract thinking cap, get out the pen and paper, and spend some time figuring out how this one-bit processor works. [Strawdog] came up with the concept one day during his commute to work (don’t worry, he takes the train… much safer than [Dave Jones'] frightening drive-time podcasts). He sketched it out on [...]
-
-
10:09
»
Hack a Day
[Hamster] wanted to take a look at division operations when the chip you’re using doesn’t have a divide instruction. He makes the point that the divide instruction takes a lot of space on the die, and that’s why it’s sometimes excluded from a chip’s instruction set. For instance, he tells us the ARM processor used [...]
-
-
14:01
»
Hack a Day
When it came time to try out some old-school computing [Quinn Dunki] grabbed a 6502 processor and got to work. For those that are unfamiliar, this is the first chip that was both powerful, affordable, and available to the hobby computing market back in the 1970′s. They were used in Apple computers, Commodore 64, and [...]
-
-
11:01
»
Hack a Day
This week, we are serving up part five in our series where we are using the Pololu 3pi robot as a fancy development board for the ATmega328p processor. This week we are taking a quick break from working with the perpherals specific to the processor and will show how to work with the 3pi’s line [...]
-
-
6:54
»
Packet Storm Security Recent Files
Whitepaper called Creating Your Own Abstract Processor. The author discusses creating a theoretical processor architecture that one can develop at the software level.
-
6:54
»
Packet Storm Security Misc. Files
Whitepaper called Creating Your Own Abstract Processor. The author discusses creating a theoretical processor architecture that one can develop at the software level.
-
-
16:57
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in Subtitle Processor 7. By supplying a long string of data as a .m3u file, Subtitle Processor first converts this input in Unicode, which expands the string size, and then attempts to copy it inline on the stack. This results a buffer overflow with SEH overwritten, allowing arbitrary code execution.
-
16:57
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in Subtitle Processor 7. By supplying a long string of data as a .m3u file, Subtitle Processor first converts this input in Unicode, which expands the string size, and then attempts to copy it inline on the stack. This results a buffer overflow with SEH overwritten, allowing arbitrary code execution.
-
16:57
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in Subtitle Processor 7. By supplying a long string of data as a .m3u file, Subtitle Processor first converts this input in Unicode, which expands the string size, and then attempts to copy it inline on the stack. This results a buffer overflow with SEH overwritten, allowing arbitrary code execution.
-
-
9:47
»
Hack a Day
Take a few minutes out of your day, grab your scissors, and learn how a simple processor works. [Saito Yutaka] put together an exercise to teach processor operations with paper. After downloading the PDF you can cut out the Address and Data pointer as well as two-bit data tokens for each. The processor has three [...]
-
-
7:33
»
Hack a Day
[Matthew Arnoff] built an 8-bit computer around the Motorola 6809 processor. He chose this processor because it seems there are a lot of Z80 builds out there and he wanted to try something different. This actually packs quite a punch. He’s clocking the machine at 2 MHz with 512 KB of SRAM memory. Compact Flash [...]
-
-
9:00
»
Hack a Day
[Matt Bunting's] hexapod caught Intel’s eye (and their wallet). This coordinated little bot runs Ubuntu on an Atom Z530 processor, popular in netbooks like the Dell Mini 10, and uses a webcam to coordinate and monitor its motion. Intel picked up two of them from [Matt] to exhibit at trade shows. As you can see, [...]
-
-
13:45
»
Wirevolution
Well, the Apple iPad is out. Time will tell whether its success will equal that of the iPhone, the Apple TV or the MacBook Air. I’m confident it will do better than the Newton. The announcement contained a few interesting points, the most significant of which is that it uses a new Apple proprietary processor, the A4. Some reviewers have described the iPad as very fast, and with good battery life; these are indications that the processor is power efficient. Because of its software similarities to the iPhone, the architecture is probably ARM-based, with special P.A. Semi sauce for power and speed. On the other hand, it could be a spin of the PWRficient CPU, which is PowerPC based. In that light, it is interesting to review Apple’s reasons for abandoning the Power PC in 2005. Maybe Apple’s massive increase in sales volume since then has made Intel’s economies of scale less overwhelming?
The price is right, as is an option to go without a 3G radio. The weight is double that of a Kindle, and half that of a MacBook Air.
I am disappointed that there is no user-pointing camera, because as I mentioned earlier, I think that videophone will be a major use for this class of device.
Update 3 February 2010: Linley Gwenapp wrote up some speculations in his newsletter.