Tag: hardware

Freespin

Freespin is a Commodore 1541 demo, released in 2021. It runs on the Commodore floppy drive. It is is the first demo on this device. Freespin generates sound/music using the floppy drive mechanic (in particular, the stepper motor responsible for moving the head to the right track). Video is generated through the serial bus.

Attack-resistant Hardware

Attacks often succeed by abusing the gap between program and machine-level semantics– for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data, and hijacking the victim program’s execution. In this work, we take secure system design on the offensive by continuously obfuscating information that attackers need but normal programs do not use, such as representation of code and pointers or the exact location of code and data. Our secure hardware architecture, Morpheus, combines 2 powerful protections: ensembles of moving target defenses and churn. Ensembles of moving target defenses randomize key program values (e.g., relocating pointers and encrypting code and pointers) which forces attackers to extensively probe the system prior to an attack. To ensure attack probes fail, the architecture incorporates churn to transparently re-randomize program values underneath the running system. With frequent churn, systems quickly become impractically difficult to penetrate. We demonstrate Morpheus through a RISC-V-based prototype designed to stop control-flow attacks. Each moving target defense in Morpheus uses hardware support to individually offer more randomness at a lower cost than previous techniques. When ensembled with churn, Morpheus defenses offer strong protection against control-flow attacks, with our security testing and performance studies revealing: i) high-coverage protection for a broad array of control-flow attacks, including protections for advanced attacks and an attack disclosed after the design of Morpheus, and ii) negligible performance impacts (1%) with churn periods up to 50 ms, which our study estimates to be at least 5000x faster than the time necessary to possibly penetrate Morpheus.

Morpheus went undefeated in a hacking challenge.

See also a related approach: Physically unclonable functions, or PUFs, exploit the fact that, at a microscopic level, even mass-produced computer chips have tiny differences. PUFs leverage that to let every chip in a computer, smartphone, or other device generate a signal that no other chip can generate.“ The SolarWinds hack that targeted the US government really got people thinking about how we’re going to be doing authentication and cryptography. We’re hopeful that this could be part of the solution.”

Porting Linux to the M1

interesting, very detailed bringup report.

The Asahi Linux project officially kicked off at the beginning of the year, but at that time we were all waiting for 1 crucial piece: support from Apple for booting alternate kernels on Apple Silicon systems. While the feature had been documented and mostly implemented, there was 1 final missing piece of the puzzle: support for the kmutil configure-boot command, which is what lets you install a non-Apple kernel. This didn’t stop us from making progress, however, as the first step to porting an OS to an undocumented platform is documenting it!

Spectre web exploit

In this post, we will share the results of Google Security Team’s research on the exploitability of Spectre against web users, and present a fast, versatile proof-of-concept (PoC) written in JavaScript which can leak information from the browser’s memory. We’ve confirmed that this proof-of-concept, or its variants, function across a variety of operating systems, processor architectures, and hardware generations.

Apple should help Intel

Helping Intel stay in the semiconductor manufacturing game should be among one of the highest priorities for all US-based technology companies. While TSMC is the leader in manufacturing process technology, they remain a geo-political risk should China decide to enforce its will on the region. Samsung is not far behind, but being a Korean company, again, future politics guarantee no safe bets. Having a leading semiconductor company founded and based in the US is incredibly strategic given how critical semiconductors are to our digital future. Apple may be one of the only companies that can help Intel right the ship.

Custom PCB

A fun look at what custom fabrication can do.

Of course, there’s a lot of email back-and-forth with the PCB shop to clarify things, and it takes an extra week to process the boards, But, it’s very important not to rush the shop when specifying highly bespoke designs because you want the best machine operators to run your boards, not just the ones who happen to be available that day. When things get really challenging, I know that King Credie’s CEO will personally go on the line to supervise production, but this is only possible because I let them prioritize correct results over fast turn delivery – he’s a busy guy, but it’s well worth the wait to get his personal assistance. He’s an engineer at heart and he knows the company’s capabilities like the back of his hand. And finally, it helps if I make it clear to the shop that for risky production runs like this, I will pay 100% of the quoted price, even if the scrap rate is high and they can only do a partial delivery. I’ve rarely been in a situation where the shop has had to adjust delivery quantities because of yield issues. I was lucky in that the bezel process worked on the first try (subsequent iterations were around refining the antenna shape and cosmetic details), but I’ve definitely had challenging PCBs where I’ve had to pay for 2 or 3 goes at process development before I had a process that worked right and yielded well.

Vinyl PC

Booting a PC from vinyl for a warmer, richer OS

To pull off the trick, Jozef leverages the rarely used and little known cassette tape interface that PCs had back in the early days. This required building a new bootloader and burning it to ROM to make the PC listen to audio signals with its 8255 programmable peripheral interface chip.

Chip Wars

The dispute over Huawei’s access to TSMC has highlighted how vulnerable American industry is to the loss of its sole supply of advanced chips. If the matter cannot be solved by negotiation, China may perceive the restrictions as economic warfare and rapidly escalate, potentially threatening Taiwan. It is not at all clear that Washington has thought through the consequences of its actions here, nor that the current administration has considered chip supply as part of a wider supply chain security and national industrial policy. Given that China has more positive options than the United States, it is surely time for those in charge to consider where this might lead.