Grand Idea Studio

Security

Hardware Hacking Training

Thursday, Apr 22nd, 2021

Joe Grand’s hardware hacking training courses teach the concepts and techniques used to explore, manipulate, and exploit electronic systems. [ continue ]

JTAGulator®

Thursday, Apr 22nd, 2021

On-chip debug (OCD) interfaces can provide chip-level control of a target device and are a primary vector used by engineers, researchers, and hackers to extract program code or data, modify memory contents, or affect device operation on-the-fly. Depending on the complexity of the target device, manually locating available OCD interfaces can be a difficult and time consuming task, sometimes requiring physical destruction or modification of the device. [ continue ]

Hardware Hacking Party Tricks

Thursday, Apr 22nd, 2021

The way electronic products are attacked is continually evolving. What used to be complex tasks requiring specialized equipment and/or knowledge are now possible with open source tools and resources created by hackers for hackers. We can take advantage of this widespread availability to more thoroughly break systems or to understand how our products might be approached by an adversary. [ continue ]

An Overview of Hardware-Based Covert Channels

Wednesday, Jun 10th, 2020

Covert channels are methods of surreptitious data transfer used to communicate with or exfiltrate information from a compromised computer system. They can exist within any layer of the system, including hardware, application software, operating system, or network stack. Typically, covert channels are employed on critical, protected, and/or air-gapped assets that an attacker may not be able to access by conventional means. [ continue ]

Through the Eyes of a Hardware Hacker

Wednesday, Oct 2nd, 2019

Within the electronics lifecycle, there lie weaknesses that can be exploited by those looking to subvert, monitor, manipulate, or intentionally damage your product or service. While embedded security is finally a topic discussed by engineers, it is difficult to properly implement given our need to meet stringent development timeframes, budgetary constraints, and manufacturing requirements. [ continue ]

Press

Hackaday

Open Source Pizza Compass Will Show ...

Malicious Life

'L0pht', Part 2 - The End

Malicious Life

The Story of 'L0pht', Part 1