---------- Treść przekazywanej wiadomości ----------
Temat: [liberationtech] Nsa-observer: organising nsa leaks by attack vector
Data: wtorek, 24 czerwca 2014, 06:15:36
Od: Todd Weiler
A brilliant site was quietly launched a while back:
https://www.nsa-observer.net/
It classifies the recent NSA revelations by Programs, Attack Vectors,
and Compartments, even providing the database in JSON format. The
dataset could feed some interesting research.
Cordially,
Todd
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moderator at
companys(a)stanford.edu.
-----------------------------------------
--
Pozdr
rysiek
Taka praca. Działający link:
http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2014/02/20/BeckerC…
---------- Treść przekazywanej wiadomości ----------
Temat: Stealthy Dopant-Level Hardware Trojans
Data: piątek, 13 września 2013, 11:49:24
Od: Eugen Leitl
Do: cypherpunks(a)al-qaeda.net
http://people.umass.edu/gbecker/BeckerChes13.pdf
Stealthy Dopant-Level Hardware Trojans ?
Georg T. Becker1
, Francesco Regazzoni2
, Christof Paar1,3 , and Wayne P. Burleson1
1University of Massachusetts Amherst, USA
2TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland
3Horst ortz Institut for IT-Security, Ruhr-Universiat Bochum, Germany
Abstract.
In recent years, hardware Trojans have drawn the attention of governments and
industry as well as the scientific community. One of the main concerns is
that integrated circuits, e.g., for military or critical infrastructure
applications, could be maliciously manipulated during the manufacturing
process, which often takes place abroad. However, since there have been no
reported hardware Trojans in practice yet, little is known about how such a
Trojan would look like, and how dicult it would be in practice to implement
one.
In this paper we propose an extremely stealthy approach for implementing
hardware Trojans below the gate level, and we evaluate their impact on the
security of the target device. Instead of adding additional circuitry to the
target design, we insert our hardware Trojans by changing the dopant polarity
of existing transistors. Since the modified circuit appears legitimate on all
wiring layers (including all metal and polysilicon), our family of Trojans is
resistant to most detection techniques, including fine-grain optical
inspection and checking against "golden chips". We demonstrate the
ectiveness of our approach by inserting Trojans into two designs | a digital
post-processing derived from Intel's cryptographically secure RNG design used
in the Ivy Bridge processors and a side-channel resistant SBox implementation
and by exploring their detectability and their ects on security.
Keywords: Hardware Trojans, malicious hardware, layout modifications, Trojan
side-channel
-----------------------------------------
--
Pozdr
rysiek
Co na to bitcoinowcy?
---------- Forwarded message ----------
From: Sampo Syreeni
Date: Tue, Jun 17, 2014 at 8:59 PM
Subject: [Cryptography] bitcoins over the air
In case people are interested in a project of a friend of mine, Joel
Lehtonen (aka Zouppen) is on a fast track to implementing Bitcoin
transaction and blockchain broadcast over the airwaves. Everything is
half done, so he might need some help; at the same time that half-done
then also includes half the funding, half the code, and half the
negotiation with the Finnish monopoly DVB-T provider, Digita, to
actually broadcast the stuff to a couple of million strong. Even if
it's just a test, it's already well on its way to happening in a month
or so; so it will.
If people are willing to chip in, especially with funding, deeper code
knowhow, radio-fu, and the rest of the useful ones, do contact him, or
me (aka decoy), on FB/G+/IRCNet/freenode, or better yet join
#bitcoinradio on the latter.
In particular we don't have any idea of how to push transactions back
towards the network over any sort of cheap-to-free, preferably
universal radio path. If you do, even in a quilted fashion, we'd
really like to know. And since the only ones who're really allowed to
experiment on them waves today are hams, those of you who possess that
qualification, your input is in the direst of needs.
Finally, I hope this isn't too much off topic; it *is* about spreading
a cryptocurrency and finding its optimal OTA protocols, after all. Not
perhaps the most usual stuff on-list nowadays...but certainly the kind
of across-the-board architectural stuff the list started out with, in
the crypto days of yonder. I hope it fits.
--
Sampo Syreeni, aka decoy - decoy(a)iki.fi, http://decoy.iki.fi/front
+358-40-3255353, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
_______________________________________________
The cryptography mailing list
cryptography(a)metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
-----------------------------------------
--
Pozdr
rysiek