[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <250191.1325031614@turing-police.cc.vt.edu>
Date: Tue, 27 Dec 2011 19:20:14 -0500
From: Valdis.Kletnieks@...edu
To: coderman <coderman@...il.com>
Cc: "Forristal, Jeff" <jeff.forristal@...el.com>,
"full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Using hardware to attack software
On Tue, 27 Dec 2011 15:52:50 PST, coderman said:
> Password recovery and information disclosure attacks involving
> hardware resources are under-represented within the security industry.
> With a growing number of attackers moving beyong pure cyber attack
> scenarios into blended hardware on flesh methods combined with
> automated software strategies to fully realize world class exploit
> trees for maximum effect, this hardware involved wetware attack can be
> ignored no longer. This paper introduces and details a wide variety
> methods from simple brass knuckles or fist packs to elaborate mental
> models of exploitation implying pain to the genitals, elaborate set
> pieces, and trained performances. we show how this taxonomy of
> coercion can be leveraged to extract passwords and obtain information
> with great efficiency and efficacy according to a framework we put
> forth...
I just won enough on Buzzword Bingo to retire. :)
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists