Design Con 2015
Breaking News
Comments
Newest First | Oldest First | Threaded View
Neo10
User Rank
Rookie
re: Black Hat finds holes in ARM, x86, embedded
Neo10   7/26/2012 4:53:43 AM
NO RATINGS
I can bet of all those technical holes they are intending to showcase the star is going to be the last one- "breaking Onity locks". This is some $$ generating seminar more than on security holes of embedded cores.

cdhmanning
User Rank
Rookie
re: Black Hat finds holes in ARM, x86, embedded
cdhmanning   7/24/2012 11:24:58 PM
NO RATINGS
Hats off for finding the problems, but their method of disclosure leaves something to be desired. If you find a vulnerability, the first thing you should do is contact the manufacturer to allow them a chance to fix the issue before the lower-tier me-too hackers use the exploits.

sharps_eng
User Rank
Rookie
re: Black Hat finds holes in ARM, x86, embedded
sharps_eng   7/24/2012 9:50:08 PM
NO RATINGS
Hats off to the hackers, though, running pro-active quality control on embedded products. The techniques they use are sometimes arcane but are of course exactly the same techniques that the bad guys would use. Can companies get their ordinary engineers trained in these techniques? I can't help but think that it would pay huge dividends having at least two guys who know what the real world might throw at the company's products. Might even sort out some of the department's IT issues while they are about it.

sharps_eng
User Rank
Rookie
re: Black Hat finds holes in ARM, x86, embedded
sharps_eng   7/24/2012 9:33:38 PM
NO RATINGS
Oh but there's balance where Rick mentions 'Intel's x86 chips'. So that's OK, then. I despair of journalists' stereotypical behaviour, lazy abuse of their privileged positions with such potential for creative enlightenment. Nearly as bad as programmers using unsafe code or engineers leaving insufficient margins in a design... OK, I'm having a bad month, seeing things too clearly again...

cpns
User Rank
Rookie
re: Black Hat finds holes in ARM, x86, embedded
cpns   7/24/2012 7:17:36 PM
NO RATINGS
The article talks about “Advanced ARM exploitation” , then goes on to say "... they will detail hardware hacks of multiple ARM platforms running Linux,[...]". So not ARM intrinsically then? It seems that Linux has the bigger part to play in this. Trying to implicate the ARM core in this is surely mostly FUD?



Flash Poll
Top Comments of the Week
Like Us on Facebook
EE Times on Twitter
EE Times Twitter Feed

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
Max Maxfield

Curiosity Killed the Cat (Just Call Me Mr. Curiosity)
Max Maxfield
23 comments
My wife, Gina The Gorgeous, loves animals. She has two stupid dogs and two stupid cats. How stupid are they? Well, allow me to show you this video of the dogs that I made a couple of years ...

Martin Rowe

No 2014 Punkin Chunkin, What Will You Do?
Martin Rowe
Post a comment
American Thanksgiving is next week, and while some people watch (American) football all day, the real competition on TV has become Punkin Chunkin. But there will be no Punkin Chunkin on TV ...

Rich Quinnell

Making the Grade in Industrial Design
Rich Quinnell
13 comments
As every developer knows, there are the paper specifications for a product design, and then there are the real requirements. The paper specs are dry, bland, and rigidly numeric, making ...

Martin Rowe

Book Review: Controlling Radiated Emissions by Design
Martin Rowe
1 Comment
Controlling Radiated Emissions by Design, Third Edition, by Michel Mardiguian. Contributions by Donald L. Sweeney and Roger Swanberg. List price: $89.99 (e-book), $119 (hardcover).