Disclaimer : Since this vulnerability has been made public, here is a small blog post explaining the methodology we used to find and exploit the
Tag: Hacking
5 Common CFP Submission Mistakes for Security Conferences
Throughout my years on the review board for Black Hat, I’ve seen quite a few mistakes in submissions. Many of these mistakes are ones I’ve
Power (Analysis) to the People
Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various
SWD part 2 : the MEM-AP
After part 1, you should now be familiar with the basics of SWD. We finished the article at the gates of an important part of
Introducing FumbleChain – A Purposefully Vulnerable Blockchain
Hello everyone, today we are happy to announce FumbleChain, a purposefully vulnerable blockchain implementation. This project has been a labor of love for the Research
Ph0wn 2018 – Flag digger
Introduction Ph0wn is a CTF (Capture The Flag) competition focused on IoT and embedded devices happening in Sophia Antipolis, France. We were asked by the