[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <E5F2DA89AC9B40438C9049B666781D9925697839@ORSMSX102.amr.corp.intel.com>
Date: Fri, 23 Dec 2011 22:27:53 +0000
From: "Forristal, Jeff" <jeff.forristal@...el.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Using hardware to attack software
Folks on this list may be interested in a recent whitepaper talking about types of attacks that leverage PC hardware to attack local software. Hardware reflected injection, anyone?
Paper is available at http://www.forristal.com/material/Forristal_Hardware_Involved_Software_Attacks.pdf
Thanks, and happy holidays!
- Jeff
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists