Тёмный

Samy Kamkar - FPGA Glitching & Side Channel Attacks 

HACKADAY
Подписаться 198 тыс.
Просмотров 25 тыс.
50% 1

Наука

Опубликовано:

 

26 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 28   
@Xoferif
@Xoferif 4 года назад
Common problem with Hackaday talk videos: Edited to show the presenter talking and misses lots of slides. Perhaps a picture-in-picture view, or something?
@simonstergaard
@simonstergaard 4 года назад
Samy is great! Also loving the sound of "the party van" at 15:20
@gcm4312
@gcm4312 4 года назад
relevant slides are not shown in the video... is there a link to the presentation?
@cvspvr
@cvspvr 9 месяцев назад
samy is my hero!
@Evil_ddddd
@Evil_ddddd 4 года назад
Nice talk, Thanks for Samy's share.
@sudocdhome
@sudocdhome 3 года назад
Nice talk. Thank you HACKADAY.
@Munden
@Munden 4 года назад
Very nice work Samy!
@melkenhoning158
@melkenhoning158 3 года назад
Sammy is my hero!
@mehrdaddashad6159
@mehrdaddashad6159 4 года назад
Wonderful!!!!!!
@fernandoblazin
@fernandoblazin 4 года назад
Hey haven't seen anything new from this guy in a while
@KeiranR
@KeiranR 4 года назад
Love this bloke ....
@alpagutsencer
@alpagutsencer 4 года назад
Correct me if i am wrong but you dont need to erase eeprom for write new info. Erasing means chage all bytes to 0xFF which is actually write operation. And you dont need that. Just put new info.
@frab88
@frab88 4 года назад
EEPROM works like UV (EPROM). A "write" operation means that you can only flip a bit from "1" to "0" (not viceversa). You cannot "write" a "1" where there's already a "0". Hence you need to perform an "erase" operation to reset all bits to a known default state (i.e. 0xFF) before the actual "write" operation. In other words you could say that the EEPROM "write" is NOT atomic.
@Aali4500
@Aali4500 4 года назад
Some new sort of hack ... Thanks man ...
@element4element4
@element4element4 3 года назад
The comments under the video say "Note: Due to technical difficulties with the live stream, Samy's talk slides are shown for the first portion of the talk, with live video beginning at about the @ mark." I think you are apologizing for the wrong thing. The problem was not that there were slides in the first portion, the problem is that the live video started at 6:30 mark and removed the slides and made it much harder to follow. The people editing talks like this are clearly not among the people watching these talks. In the institute where I did my theoretical physics PhD we had a team hired to record all lectures and talks. But they always insisted on fancy cutting the camera between different angles, showing the speaker speak from different perspectives, while the scientists at the institute just wanted the slides (or sometimes blackboard) + the voice. There is little info in looking at the speaker while he is pointing to slides we can't see.
@element4element4
@element4element4 3 года назад
The best way to record talks like this is to have picture in picture, where the slides are shown in nearly full screen and the speaker in a small picture in the corner.
@hobrin4242
@hobrin4242 3 года назад
your timing hack reminds me of what I tried in minecraft once we figured out remote chunk loading, to see if it was loaded from disk or generated newly or already loaded. We tried using timings but over the network that was too unreliable. Then we tried out to do the timing on the server's side, so you could time the delay between 2 events and inbetween those you do the chunk loading. Didn't find a good second event though.
@godfather7339
@godfather7339 2 года назад
I remember using some mod that showed whether a chunk was already generated or not and mark the pre generated ones red on screen. Do the mods these days use the timing hack or something else? The mods were pretty accurate and we would follow the trails to find people's bases.
@hobrin4242
@hobrin4242 2 года назад
@@godfather7339 yeah so how that works is that minecraft generetes chunks in 2 phases but it loads chunks in 1. So when the chunk generation sends an additional large block update packet when loading the chunk, so therefore it must have been newly generated your client assumes. This works most of the time.
@TS-jm7jm
@TS-jm7jm 4 года назад
Why are some of the links redacted?
@TS-jm7jm
@TS-jm7jm 4 года назад
@@Willam_J ah, noted thanks
@emilio_wayne
@emilio_wayne 4 года назад
Chipwhisperer is a great tool. Side Channel Attack and Correlation Power Analyze. Excellent efficiency vs prices...Great video pip...
@syntempl2426
@syntempl2426 4 года назад
hey so if a non volatile sram is used it is much more vulnerable to memory imaging?
@ismailb4334
@ismailb4334 4 года назад
Link to the slides please? or his email so that I can ask him for them?
@triangleenjoyer
@triangleenjoyer 4 года назад
Is there a link to the slides?
@PHamster
@PHamster 4 года назад
**Wears Tin Foil Hat**
@danielwhite6441
@danielwhite6441 4 года назад
I wish he would hack wms bluebird wms 550 or some slot machines. I'd like to run different roms on mine.
Далее
Michael Ossmann: Simple RF Circuit Design
1:06:21
Просмотров 254 тыс.
Свожу все свои тату (abricoss_a_tyt)
00:35
Introduction to Side-Channel Power Analysis (SCA, DPA)
1:08:57
18 Weird and Wonderful ways I use Docker
26:18
Просмотров 148 тыс.
16. Side-Channel Attacks
1:22:16
Просмотров 44 тыс.
Samy Kamkar: Getting Started with Reverse Engineering
11:04
РАСПАКОВКА АЙФОНА 16 PRO MAX
1:01