Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 09/17/13 in all areas

  1. Buna seara. Imi cer mii de scuze daca acest tutorial a mai fost postat pe RST de catre o alta persoana, dar nu am stiut ce sa caut pentru a verifica. Asadar in ce consta tutorialul... Un mic truc descoperit de Charlz, prin care iti poti face postul tau de pe facebook ceva mai interesant. Spre exemplu, poti adauga in postul tau de pe facebook langa butonul de like un text cu url catre orice site dorit. Primul pas catre tutorial este: 1) Deschide un browser web si adauga urmatorul cod in bara de adrese(URL-BAR). https://www.facebook.com/connect/uiserver.php?app_id=2915120374&display=touch&method=stream_publish&redirect_uri=http://www.facebook.com&async&action_links=[{%22text%22:%22Romania%20Security Team%22,%22href%22:%22http://www.rstforums.com%22}]&attachment={'media':[{'type':'image','src':'#','href':'http://www.google.ro'}],'description':'','properties':{'Click+':{'text':'RST-Romania Security Team','href':'http://www.google.ro'}}} 2) Odata ce ai introdus codul, si ai apasat enter, ti se deschide pagina de mobil pentru a adauga starea ta, unde poti completa in spatiul liber cu absolut orice doresti, fara sa afectezi invr-un fel scriptul. 3) Codul poate fi modificat dupa bunul plac, cu doar cateva cunostinte minime de progamare. Mult noroc, si imi cer scuze daca am deranjat pe cineva prin acest tutorial.
    1 point
  2. Georg T. Becker , Francesco Regazzoni , Christof Paar and Wayne P. Burleson University of Massachusetts Amherst, USA TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland Horst Göortz Institut for IT-Security, Ruhr-Universität Bochum, Germany Abstract. In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scienti?c community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans in practice yet, little is known about how such a Trojan would look like, and how di?cult it would be in practice to implement one. In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modi?ed circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including ?ne-grain optical inspection and checking against “golden chips”. We demonstrate the e?ectiveness of our approach by inserting Trojans into two designs — a digital post-processing derived from Intel’s cryptographically secure RNG design used in the Ivy Bridge processors and a side-channel resistant SBox implementation — and by exploring their detectability and their e?ects on security. http://people.umass.edu/gbecker/BeckerChes13.pdf
    1 point
×
×
  • Create New...