side channels: power analysis
side channels: using the chipwhisperer
This is a post in a series regarding side channels, from the theoretical and pratical point of view; the posts are
- introduction on the model of computing devices (to be finished)
- using the Chipwhisperer (this post)
- power analysis (here)
- glitching (to be finished)
Reusing old shit: laptop keyboard
Here we are with another experiment in reusing otherwise trash-destined electronics material; in this episode we are going to refurbish a keyboard, from the recovering of the internal "matrix" to the design of the PCB destined as the controller board, to finally reworking of an existing firmware to create a new USB keyboard.
blog migration to Nikola
After running for a couple of years using jekill
as a static site generator
I decided to switch to nikola
for a couple of reasons: first of all because
is implemented in python
, a language that I know more than ruby
and this
allows me to improve the platform and customize it more to suite my needs.
Reusing old shit: creating a BSP using Yocto for the Samsung Galaxy S (S5PV210)
In this post I'll describe my esperiments in reusing my old Samsung Galaxy S; don't expected anything sophisticated, it's more a brain dump.
Reusing old shit: lcd screen
It's happened in the past that someone gifted me of very old (and not working anymore) laptops that otherwise would have been thrown in the garbage; my idea for them was of reusing some parts that are more valuable: battery, disks, keyboards, etc...
Modern cryptography: exercises chapter 3 'Private-key encryption'
These are some solved exercises of chapter 3 of the book "Introduction to modern cryptography" (second edition) by Jonathan Katz and Yehuda Lindell. For chapter 2 go here.
Notes on JavaScriptCore
In this post I want to add some pratical notes (and maybe a new tool) to the paper from saelo about exploiting modern browsers; in particular I'll focus on Webkit and as in his paper, I'll deep dive into the source code of that version of webkit.
Configuring an IpSec VPN (fortigate client)
I was in need to have a working VPN with Fortigate and here I'm going to recollect the procedure that has permited to accomplish such simple but incredibly complex task.
VGA controller simulation with verilator
In my two previous posts I implemented a simple VGA controller and one with the text mode but now I want to explore
the possibility to simulate it using verilator
.