
Full Disclosure mailing list archives
Re: Using hardware to attack software
From: coderman <coderman () gmail com>
Date: Tue, 27 Dec 2011 15:28:50 -0800
On Tue, Dec 27, 2011 at 2:30 PM, Gage Bystrom <themadichib0d () gmail com> wrote:
... My main criticisms involved presentation of your work that I believed could wind up coining useless buzz words, proliferation of bad terminology, and enforcing incorrect paradigms.
in infosec they call this "putting your mark on the world" for those who play the game this is a feature, not a bug!
... Perhaps refocusing the paper around some sort of 'driver vulnerability taxonomy', or as you said was intended 'overlooked/poorly understood driver attacks'...
*yawn* when was the last time physical or emissions security was interesting? even side channels are second tier these days. the microcomputer is a microcosm of distributed systems, with rich attack surfaces at every layer from bios to firmware to embedded components and offload systems (themselves a fractal iteration of general purpose computing, within general purpose computing, within...) all before you even get to the software interfacing with this malleable hardishsoftyware or the applications running top side. turtles all the way down! with vuln crumbs or exploit feasts spanning decades, depending on specialization and isolation of the technologies at hand.
I hope that is clear as I sometimes have a bad habit of rambling.
your analysis is succinct and sane! this, however, is a negative sign given the subject at hand... _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Using hardware to attack software Forristal, Jeff (Dec 24)
- Re: Using hardware to attack software Gage Bystrom (Dec 24)
- Re: Using hardware to attack software Forristal, Jeff (Dec 29)
- Re: Using hardware to attack software Gage Bystrom (Dec 27)
- Re: Using hardware to attack software coderman (Dec 27)
- Re: Using hardware to attack software Forristal, Jeff (Dec 29)
- Re: Using hardware to attack software Gage Bystrom (Dec 24)
- Re: Using hardware to attack software coderman (Dec 27)
- Re: Using hardware to attack software Valdis . Kletnieks (Dec 27)