Research Bulletin May 25, 2021
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Bootstomp: on the Security of Bootloaders in Mobile Devices
BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna, UC Santa Barbara https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna fnredini, machiry, dipanjan, yanick, antoniob, edg, yans, chris, [email protected] University of California, Santa Barbara Abstract by proposing simple mitigation steps that can be im- plemented by manufacturers to safeguard the bootloader Modern mobile bootloaders play an important role in and OS from all of the discovered attacks, using already- both the function and the security of the device. They deployed hardware features. help ensure the Chain of Trust (CoT), where each stage of the boot process verifies the integrity and origin of 1 Introduction the following stage before executing it. This process, in theory, should be immune even to attackers gaining With the critical importance of the integrity of today’s full control over the operating system, and should pre- mobile and embedded devices, vendors have imple- vent persistent compromise of a device’s CoT. However, mented a string of inter-dependent mechanisms aimed at not only do these bootloaders necessarily need to take removing the possibility of persistent compromise from untrusted input from an attacker in control of the OS in the device. -
Anurag Sharma | 1 © Vivekananda International Foundation Published in 2021 by Vivekananda International Foundation
Anurag Sharma | 1 © Vivekananda International Foundation Published in 2021 by Vivekananda International Foundation 3, San Martin Marg | Chanakyapuri | New Delhi - 110021 Tel: 011-24121764 | Fax: 011-66173415 E-mail: [email protected] Website: www.vifindia.org Follow us on Twitter | @vifindia Facebook | /vifindia All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, or by any means electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Anurag Sharma is a Research Associate at Vivekananda International Foundation (VIF). He has completed MPhil in Politics and International Relations on ‘International Security’ at the Dublin City University in Ireland, in 2018. His thesis is titled as “The Islamic State Foreign Fighter Phenomenon and the Jihadi Threat to India”. Anurag’s main research interests are terrorism and the Internet, Cybersecurity, Countering Violent Extremism/Online (CVE), Radicalisation, Counter-terrorism and Foreign (Terrorist) Fighters. Prior to joining the Vivekananda International Foundation, Anurag was employed as a Research Assistant at Institute for Conflict Management. As International affiliations, he is a Junior Researcher at TSAS (The Canadian Network for Research on Terrorism, Security, And Society) in Canada; and an Affiliate Member with AVERT (Addressing Violent Extremism and Radicalisation to Terrorism) Research Network in Australia. Anurag Sharma has an MSc in Information Security and Computer Crime, major in Computer Forensic from University of Glamorgan (now University of South Wales) in United Kingdom and has an online certificate in ‘Terrorism and Counterterrorism’ from Leiden University in the Netherlands, and an online certificate in ‘Understanding Terrorism and the Terrorist Threat’ from the University of Maryland, the United States. -
Prohibited Agreements with Huawei, ZTE Corp, Hytera, Hangzhou Hikvision, Dahua and Their Subsidiaries and Affiliates
Prohibited Agreements with Huawei, ZTE Corp, Hytera, Hangzhou Hikvision, Dahua and their Subsidiaries and Affiliates. Code of Federal Regulations (CFR), 2 CFR 200.216, prohibits agreements for certain telecommunications and video surveillance services or equipment from the following companies as a substantial or essential component of any system or as critical technology as part of any system. • Huawei Technologies Company; • ZTE Corporation; • Hytera Communications Corporation; • Hangzhou Hikvision Digital Technology Company; • Dahua Technology company; or • their subsidiaries or affiliates, Entering into agreements with these companies, their subsidiaries or affiliates (listed below) for telecommunications equipment and/or services is prohibited, as doing so could place the university at risk of losing federal grants and contracts. Identified subsidiaries/affiliates of Huawei Technologies Company Source: Business databases, Huawei Investment & Holding Co., Ltd., 2017 Annual Report • Amartus, SDN Software Technology and Team • Beijing Huawei Digital Technologies, Co. Ltd. • Caliopa NV • Centre for Integrated Photonics Ltd. • Chinasoft International Technology Services Ltd. • FutureWei Technologies, Inc. • HexaTier Ltd. • HiSilicon Optoelectronics Co., Ltd. • Huawei Device Co., Ltd. • Huawei Device (Dongguan) Co., Ltd. • Huawei Device (Hong Kong) Co., Ltd. • Huawei Enterprise USA, Inc. • Huawei Global Finance (UK) Ltd. • Huawei International Co. Ltd. • Huawei Machine Co., Ltd. • Huawei Marine • Huawei North America • Huawei Software Technologies, Co., Ltd. • Huawei Symantec Technologies Co., Ltd. • Huawei Tech Investment Co., Ltd. • Huawei Technical Service Co. Ltd. • Huawei Technologies Cooperative U.A. • Huawei Technologies Germany GmbH • Huawei Technologies Japan K.K. • Huawei Technologies South Africa Pty Ltd. • Huawei Technologies (Thailand) Co. • iSoftStone Technology Service Co., Ltd. • JV “Broadband Solutions” LLC • M4S N.V. • Proven Honor Capital Limited • PT Huawei Tech Investment • Shanghai Huawei Technologies Co., Ltd. -
Mediatek Linkit™ Development Platform for RTOS Get Started Guide
MediaTek LinkIt™ Development Platform for RTOS Get Started Guide Version: 3.0 Release date: 30 June 2016 © 2015 - 2016 MediaTek Inc. This document contains information that is proprietary to MediaTek Inc. (“MediaTek”) and/or its licensor(s). MediaTek cannot grant you permission for any material that is owned by third parties. You may only use or reproduce this document if you have agreed to and been bound by the applicable license agreement with MediaTek (“License Agreement”) and been granted explicit permission within the License Agreement (“Permitted User”). If you are not a Permitted User, please cease any access or use of this document immediately. Any unauthorized use, reproduction or disclosure of this document in whole or in part is strictly prohibited. THIS DOCUMENT IS PROVIDED ON AN “AS-IS” BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES OF ANY KIND AND SHALL IN NO EVENT BE LIABLE FOR ANY CLAIMS RELATING TO OR ARISING OUT OF THIS DOCUMENT OR ANY USE OR INABILITY TO USE THEREOF. Specifications contained herein are subject to change without notice. MediaTek LinkIt™ Development Platform for RTOS Get Started Guide Document Revision History Revision Date Description 1.0 24 March 2016 Initial version. 2.0 17 May 2016 Move the contents relative to flash, HDK, and build comments to corresponding documents. Add the support of Keil 3.0 30 June 2016 Add the support of IAR. Refine the architecture and provide more information on the SDK usage. © 2015 - 2016 MediaTek Inc. Page i of v This document contains information that is proprietary to MediaTek Inc. -
Undersampled Pulse Width Modulation for Optical Camera Communications
Undersampled Pulse Width Modulation for Optical Camera Communications Pengfei Luo1, Tong Jiang1, Paul Anthony Haigh2, Zabih Ghassemlooy3,3a, Stanislav Zvanovec4 1Research Department of HiSilicon, Huawei Technologies Co., Ltd, Beijing, China E-mail: {oliver.luo, toni.jiang}@hisilicon.com 2Department of Electronic and Electrical Engineering, University College London, London, UK Email: [email protected] 3Optical Communications Research Group, NCRLab, Faculty of Engineering and Environment, Northumbria University, Newcastle-upon-Tyne, UK 3aQIEM, Haixi Institutes, Chinese Academy of Sciences, Quanzhou, China Email: [email protected] 4Department of Electromagnetic Field, Faculty of Electrical Engineering, Czech Technical University in Prague, 2 Technicka, 16627 Prague, Czech Republic Email: [email protected] Abstract—An undersampled pulse width modulation (UPWM) According to the Nyquist sampling theorem, if these FRs are scheme is proposed to enable users to establish a non-flickering adopted for sampling, the transmitted symbol rate Rs must be optical camera communications (OCC) link. With UPWM, only a lower than half the sampling rate. However, this will clearly digital light emitting diode (LED) driver is needed to send signals lead to light flickering due to the response time of the human using a higher order modulation. Similar to other undersample- eye. Therefore, a number of techniques have been proposed to based modulation schemes for OCC, a dedicated preamble is support non-flickering OCC using low speed cameras (e.g., ≤ required to assist the receiver to indicate the phase error 60 fps). More precisely, there are three main modulation introduced during the undersampling process, and to compensate categories for LFR-based OCC using both global shutter (GS) for nonlinear distortion caused by the in-built gamma correction and rolling shutter (RS) digital cameras: i) display-based [3], ii) function of the camera. -
Hi3519a V100 4K Smart IP Camera Soc Breif Data Sheet
Hi3519A V100 4K Smart IP Camera SoC Breif Data Sheet Issue 02 Date 2018-06-20 Copyright © HiSilicon Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of HiSilicon Technologies Co., Ltd. Trademarks and Permissions , , and other HiSilicon icons are trademarks of HiSilicon Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between HiSilicon and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. HiSilicon Technologies Co., Ltd. Address: New R&D Center, Wuhe Road, Bantian, Longgang District, Shenzhen 518129 P. R. China Website: http://www.hisilicon.com Email: [email protected] HiSilicon Proprietary and Confidential Issue 02 (2018-06-20) 1 Copyright © HiSilicon Technologies Co., Ltd. Hi3519A V100 Hi3519A V100 4K Smart IP Camera SoC Introduction Key Features Hi3519A V100 is a high-performance and low-power 4K Low Power Smart IP Camera SoC designed for IP cameras, action cameras, 1.9 W power consumption in a typical scenario for 4K x panoramic cameras, rear view mirrors, and UAVs. -
We Shape the Connected World Automotive Autonomy Generating Energy Effectively Wearable Technology ARM’S Technology Is Cars Are Becoming Mobile Computing Platforms
ARM Holdings plc Annual Report 2015: Strategic Report We shape the connected world Automotive autonomy Generating energy effectively Wearable technology ARM’s technology is Cars are becoming mobile computing platforms. Wind turbines and solar panels can be made Smart watches, biometric-monitors and More sensors and cameras are being included more effective by including technology that augmented reality headsets are intelligent, to assist the driver with lane detection, reading controls and monitors the wind turbine, and connected devices that can give us extra shaping the way we roadside signage and identifying potential hazards aggregates data across the entire wind farm. information to improve our health and or people crossing the road. In time, driver wellness, or just to help us have more fun. all live our lives; in the assistance may lead to a fully automated vehicle. home, as we travel, at school or work, and as we have fun with our friends Mobile computing Smart city streets Intelligent networks Smarter homes ARM-based mobile computers, including City infrastructure from street lights to car Broadband and mobile phone network speeds Cost-efficiency in the home can be improved smartphones, tablets and some laptops are, parking meters can be made more effective by are increasing, and latency decreasing, enabling through learning thermostats that understand for many people, the primary device for their embedding intelligent chips. Street lights that new services for operators to provide to your daily routine, domestic appliances that use work, whether in an office or on the road; can dim when no one is nearby will save energy consumers and enterprises, from delivering advanced algorithms for calculating water and for researching and writing school assignments; and reduce carbon emissions, and prognostics in more movie and TV options to collating and detergent requirements, and smart meters that and for engaging with friends. -
Analyzing Android GNSS Raw Measurements Flags Detection
Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms for Collaborative Positioning in Urban Environment Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet To cite this version: Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet. Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms for Collaborative Positioning in Urban Envi- ronment. ICL-GNSS 2020 International Conference on Localization and GNSS, Jun 2020, Tampere, Finland. pp.1-6, 10.1109/ICL-GNSS49876.2020.9115564. hal-02870213 HAL Id: hal-02870213 https://hal-enac.archives-ouvertes.fr/hal-02870213 Submitted on 17 Jun 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms for Collaborative Positioning in Urban Environment Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet To cite this version: Thomas Verheyde, Antoine Blais, Christophe Macabiau, François-Xavier Marmet. Analyzing Android GNSS Raw Measurements Flags Detection Mechanisms -
Mediatek Inc
01 May 2015 Asia Pacific/Taiwan Equity Research Semiconductor Devices MediaTek Inc. (2454.TW / 2454 TT) Rating NEUTRAL* Price (30 Apr 15, NT$) 395.00 RESULTS Target price (NT$) 405.00¹ Upside/downside (%) 2.5 Mkt cap (NT$ mn) 708,117 (US$ 23,121) 2Q lacks growth, but a high bar is set for 2H Enterprise value (NT$ mn) 544,619 ■ 1Q15 results in line with CS, but below street. 1Q15 sales were already Number of shares (mn) 1,792.70 Free float (%) 89.1 reported at NT$47.5 bn, -14.3% QoQ. Smartphone shipments were 85 mn 52-week price range 535.0 - 390.0 (30mn LTE), down from 95-100mn in 4Q14 due to seasonality and emerging ADTO - 6M (US$ mn) 101.0 market weakness. GMs met our 47.3% vs 46-48% guidance and OpM was also *Stock ratings are relative to the coverage universe in each analyst's or each team's respective sector. in line at 16.1% on cost controls. Lower non-op income kept EPS only in line ¹Target price is for 12 months. with our NT$4.62 and below street's NT$4.97. Research Analysts ■ 2Q15 guidance below, inventory elevated. Sales were guided -5% to +3% Randy Abrams, CFA QoQ, below CS/street's +9%/+18% QoQ on 3G price pressure and 4G mix 886 2 2715 6366 [email protected] skewed to the entry level. Margins are in line, with GMs at 45.5-47.5% and Nickie Yue OpM at 12.5-16.5%. Inventory is elevated, at 102 days and guided to stay 886 2 2715 6364 98-110 days in 2Q15, requiring 2H15 acceleration. -
Hi3798m V200 Brief Data Sheet
Hi3798M V200 Hi3798M V200 Brief Data Sheet Key Specifications Processor Security Processing Multi-core 64-bit high-performance ARM Cortex Advanced CA and downloadable CA A53 DRM Multi-core high-performance GPU Secure boot, secure storage, and secure upgrade Memory Control Interfaces Graphics and Display Processing (Imprex 2.0 DDR3/4 interface Processing Engine) eMMC/NOR/NAND flash interface Multiple HDR formats Video Decoding (HiVXE 2.0 Processing Engine) 3D video processing and display Maximum 4K x 2K@60 fps 10-bit decoding 2D graphics acceleration engine Multiple decoding formats, including Audio and Video Interfaces H.265/HEVC, AVS, H.264/AVC MVC, MPEG-1/2/4, VC-1, and so on HDMI 2.0b output Analog video interface Image Decoding Digital and analog audio interfaces Full HD JPEG and PNG hardware decoding Peripheral Interfaces Video and Image Encoding GE and FE network ports 1080p@30 fps video encoding Multiple USB ports Audio Encoding and Decoding SDIO, UART, SCI, IR, KeyLED, and I2C interfaces Audio decoding in multiple formats Audio encoding in multiple formats Others DVB Interface Ultra-low-power design with less than 30 mW standby power consumption Multi-channel TS inputs and outputs BGA package Solution Is targeted for the DVB/Hybrid STB market. Complies with the broadcasting television-level Supports full 4K decoding. picture quality standards. Supports Linux, Android, and TVOS intelligent Metes the increasing value-added service operating systems requirements. Copyright © HiSilicon (Shanghai) Technologies -
IN the UNITED STATES DISTRICT COURT for the WESTERN DISTRICT of TEXAS WACO DIVISION AMERICAN PATENTS LLC, Plaintiff, V. ANALOG D
Case 6:18-cv-00356 Document 1 Filed 12/06/18 Page 1 of 64 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS WACO DIVISION AMERICAN PATENTS LLC, CIVIL ACTION NO. 6:18-CV-356 Plaintiff, ORIGINAL COMPLAINT FOR v. PATENT INFRINGEMENT ANALOG DEVICES, INC., CYPRESS JURY TRIAL DEMANDED SEMICONDUCTOR CORPORATION, MARVELL INTERNATIONAL, LTD., MEDIATEK INC., and MEDIATEK USA INC., Defendants. ORIGINAL COMPLAINT FOR PATENT INFRINGEMENT Plaintiff American Patents LLC (“American Patents” or “Plaintiff”) files this original complaint against Defendants Analog Devices, Inc., Cypress Semiconductor Corporation, Marvell International, Ltd., MediaTek Inc., and MediaTek USA Inc. (collectively “Defendants”), alleging, based on its own knowledge as to itself and its own actions and based on information and belief as to all other matters, as follows: PARTIES 1. American Patents is a limited liability company formed under the laws of the State of Texas, with its principal place of business at 2325 Oak Alley, Tyler, Texas, 75703. 2. Analog Devices, Inc. (“Analog”) is a corporation organized and existing under the laws of the state of Massachusetts. It can be served via its registered agent: CT Corp System, 1999 Bryan Street, Suite 900, Dallas, TX 75201. 3. Analog is one of the world’s largest manufacturers of integrated circuits. Case 6:18-cv-00356 Document 1 Filed 12/06/18 Page 2 of 64 4. Cypress Semiconductor Corporation (“Cypress”) is a corporation organized under the laws of the state of Delaware. Cypress can be served with process by serving its registered agent: Corporation Service Company d/b/a CSC-Lawyers Incorporating Service Company, 211 E. -
A Systematic Survey of Firmware Extraction Techniques for Iot Devices
Breaking all the Things | A Systematic Survey of Firmware Extraction Techniques for IoT Devices Sebastian Vasile, David Oswald, and Tom Chothia University of Birmingham [email protected], [email protected], [email protected] Abstract. In this paper, we systematically review and categorize differ- ent hardware-based firmware extraction techniques, using 24 examples of real, wide-spread products, e.g. smart voice assistants (in particular Amazon Echo devices), alarm and access control systems, as well as home automation devices. We show that in over 45% of the cases, an exposed UART interface is sufficient to obtain a firmware dump, while in other cases, more complicated, yet still low-cost methods (e.g. JTAG or eMMC readout) are needed. In this regard, we perform an in-depth investiga- tion of the security concept of the Amazon Echo Plus, which contains significant protection methods against hardware-level attacks. Based on the results of our study, we give recommendations for countermeasures to mitigate the respective methods. 1 Introduction Extracting the firmware from IoT devices is a crucial first step when analysing the security of such systems. From a designer's point of view, preventing the firmware from falling into the hands of an adversary is often desirable: for in- stance, to protect cryptographic keys that identify a device and to impede prod- uct counterfeit or IP theft. The large variety of IoT devices results in different approaches to firmware extraction, depending on the device in question. Past work has looked at the state of security of IoT devices, e.g.