Latest News

Read all latest blog posts

The exploit recon 'msg_msg' and its mitigation in VED
November 13, 2022

The exploit recon 'msg_msg' and its mitigation in VED

Why msg_msg? The size of structure is control by userspace Firstly, the length of the msg_msg struct can be indirectly controlled from userspace, which means that msg can overlap the cache of the specified types.

Read More
Exploiting CVE-2021-26708 (Linux kernel) with sshd
March 1, 2022

Exploiting CVE-2021-26708 (Linux kernel) with sshd

Kernel vulnerability CVE-2021-26708 Alexander Popov has published an article Four Bytes of Power: Exploiting CVE-2021-26708 in the Linux kernel which use a four-byte overwrite vulnerability to do privilege escalation.

Read More
Intel SGX deprecation review
January 15, 2022

Intel SGX deprecation review

The rumors about Intel SGX deprecated in new processors has been confirmed, 12th generation processors (Workstation/Desktop/Laptop/embedded platforms) will deprecate SGX and the SGX will continue to support only in high-end Xeon CPU for server:

Read More
Risk analysis of Log4Shell (CVE-2021-44228) and mitigation
December 17, 2021

Risk analysis of Log4Shell (CVE-2021-44228) and mitigation

Risk analysis of Log4Shell (CVE-2021-44228) and mitigation Log4Shell is a high impact exploitable bug in Java logging framework logj4.

Read More
VaultBoot: Next-Gen Firmware Security Solution
September 19, 2021

VaultBoot: Next-Gen Firmware Security Solution

Background Firmware is a special type of software, mainly used for the control and communication of the underlying hardware.

Read More
VaultFuzzer: A state-based approach for Linux kernel
September 13, 2021

VaultFuzzer: A state-based approach for Linux kernel

Background Since the beginning of computer software development, software quality has become an inevitable issue in the field of software testing.

Read More
VED (Vault Exploit Defense): A threat detection and prevention system
September 6, 2021

VED (Vault Exploit Defense): A threat detection and prevention system

Background In the beginning of the hacker's era, a long-term battle for control of the “CORE” in memory has been waged since Aleph One published the paper Smashing The Stack For Fun And Profit on Phrack Issue 49 in 1996.

Read More
What every CISO and security engineer should know about Intel CSME
July 16, 2021

What every CISO and security engineer should know about Intel CSME

Background The majority of infosec community are trying to ignore the risks below the OS in past decades but it’s impossible to bury all of them at low cost today.

Read More
VaultHSM report: The way to confirm whether the Smart Card (J3H145) supports RFC-6979 ECDSA implementation
July 7, 2021

VaultHSM report: The way to confirm whether the Smart Card (J3H145) supports RFC-6979 ECDSA implementation

Background The original implementation of DSA-type signature algorithm (including ECDSA) needs a random number which belongs to the same mathematical object of the private key (an element of GF(p), in which p is a prime number).

Read More
Public crypto audit report: lurch/OMEMO
June 17, 2021

Public crypto audit report: lurch/OMEMO

lurch/OMEMO Security Assessment Crypto is a neutral technology just like the natural existence (“For he makes his sun rise on the evil and on the good, and sends rain on the just and on the unjust.

Read More