3mdeb: open source hardware TPM

https://github.com/3mdeb/tpm2_2x5pin_2mm_lpc https://certification.oshwa.org/pl000006.html Newly-certified as Open Source Hardware by OSHWA. Trusted Platform Module compatible with 2x5p LPC header (populated on Librebox platform) can be used in disk encryption, password protection, platform integrity and other security issues. TPM module supports LPC interface, Intel TXT and Microsoft Windows and Google Chromebook certification criteria for successful platform qualification. TPM … Continue reading 3mdeb: open source hardware TPM

3mdeb: 5 terms every hypervisor developer should know

This is the first post of a series about developing type-1 hypervisors, also known as native or bare-metal hypervisors. It introduces to Intel’s VMX technology, describes interactions between a virtual machine and a hypervisor as well as gives some insight on the control structures required. This post should give some theoretical knowledge base required for … Continue reading 3mdeb: 5 terms every hypervisor developer should know

3mdeb: Minnowboard Turbot remote firmware flashing with RTE (Remote Testing Environment)

#Minnowboard Turbot remote #firmware flashing with #RTE (Remote Testing Environment) – #3mdeb #Embedded Systems Consulting https://t.co/T7UGOkr8Sp #RTE is our small hardware project that we use for #Firmware #Security #validation — 3mdeb (@3mdeb_com) April 5, 2018 Minnowboard Turbot remote firmware flashing with RTE (Remote Testing Environment) April 5, 2018 Arek Cichocki Work related to a hardware … Continue reading 3mdeb: Minnowboard Turbot remote firmware flashing with RTE (Remote Testing Environment)

Purism pulls FSP blog post

Re: https://firmwaresecurity.com/2018/04/03/intel-fsp-reverse-engineering-finding-the-real-entry-point/ “2018-04-23 update: after receiving a courtesy request from Intel’s Director of Software Infrastructure, we have decided to remove this post’s technical contents while we investigate our options.” #firmware #security #freedom #coreboot https://t.co/23wnXI9lQl — 3mdeb (@3mdeb_com) April 26, 2018 https://puri.sm/posts/intel-fsp-reverse-engineering-finding-the-real-entry-point/ 2018-04-23 update: after receiving a courtesy request from Intel’s Director of Software Infrastructure, we … Continue reading Purism pulls FSP blog post

UbootKit: A Worm Attack for the Bootloader of IoT Devices

#UbootKit: A #Worm Attack for the #Bootloader of #IoT Devices – Black Hat Asia 2018 | Briefings Schedule https://t.co/rYmqip6S6Q — 3mdeb (@3mdeb_com) January 24, 2018 UbootKit, a manipulation attack against the bootloader, can remotely control devices & spread malware #BHASIA Briefing https://t.co/hiAOFLex4V — Black Hat (@BlackHatEvents) January 12, 2018 UbootKit: a Worm Attack for the … Continue reading UbootKit: A Worm Attack for the Bootloader of IoT Devices

European Coreboot Conference 2017: some presentations online

Multiple PDFs from the European Coreboot Conference 2017, are already online, linked off their individual event pages, eg: #ECC2017 presentation materials about #TPM 2.0 and its state in #coreboot already available #firmware #security https://t.co/dwQa4GeY32 — 3mdeb (@3mdeb_com) October 31, 2017 #ECC2017 presentation materials about booting #UEFI payload and #coreboot already available #firmware #security https://t.co/8qPGhUNqQB — … Continue reading European Coreboot Conference 2017: some presentations online

Barr Group’s Embedded C Coding Standard how has free options

Barr Group's #Embedded C Coding Standard is Now #Free #ebook https://t.co/trXhI1pUy1 — 3mdeb (@3mdeb_com) August 7, 2017 Book available in 4 flavors, 2 are free, online HTML and downloadable PDF. Barr Group’s Embedded C Coding Standard was developed to minimize bugs in firmware by focusing on practical rules that keep bugs out–while also improving the … Continue reading Barr Group’s Embedded C Coding Standard how has free options