- Full text PDF available (7)
The acquisition of volatile memory from a compromised computer is difficult to perform reliably because the acquisition procedure should not rely on untrusted code, such as the operating system or applications executing on top of it. In this paper, we present a procedure for acquiring volatile memory using a hardware expansion card that can copy memory to… (More)
The design of secure hardware is often overlooked in the product development lifecycle, leaving many devices vulnerable to hacker attacks resulting in theft of service, loss of revenue, or a damaged reputation. Many times, products must be redesigned after a harmful incident, which raises overall development costs and increases time-to-market. This paper… (More)
Want to know how something works? Tear it apart. Along the way, you might learn to improve it or make it do something it was never intended to do.
The primary purpose of printed circuit board (PCB) reverse engineering is to determine electronic system or subsystem functionality by analyzing how components are interconnected. We performed a series of experiments using both inexpensive home-based solutions and state-of-the-art technologies with a goal of removing exterior coatings and accessing… (More)
Stolen passwords represent a significant threat to today's enterprise. It has become apparent that a simple username and static non-changing password combination to login to a system is not adequate to protect most business information. As the corporate network is increasingly used to store dis-parate levels of company confidential information, there is a… (More)
Invention has always made popular television, and the advent of reality TV, along with advances in rapid prototyping technology, has made it possible to design and create inventions in front of the camera. There is also growing interest in producing TV that attracts home viewers who are, or aspire to be, hackers. The authors describe their experiences… (More)