Latest Posts
-
Understanding ARM Trusted Firmware using QEMU
For many of us working in the embedded world with ARM devices, it is not uncommon to have come across the company’s marketing terms on security - “TrustZone”, “Trusted Execution...
-
PWNABLE.tw calc challenge writeup
It’s amazing how benign things in a binary can be exploited to gain complete control of the system. In this post I describe the details of solving challenge #3 (calc)...
-
RAMoops panic logger on Raspberry Pi
There is a neat feature in Linux and I decided to write it up before I forget it. Has your system ever gone into a reset and you wished that...
-
Performance Monitoring Unit in ARM
Profiling tools help developers evaluate how their code interacts with the undelying processor. Details on cache access, memory reads/writes and processor clock cycles can be used to provide summarized analysis...
-
Page tables in Linux
Linux employs virtual addresses instead of physical addresses to isolate each process’s address space and provide greater security. But ultimately accessing the physical memory will require that the memory controller...