Termin:Chaotic-Congress-Cinema Nr. 21

Aus Attraktor Wiki

Wechseln zu: Navigation, Suche


Chaotic-Congress-Cinema Nr. 21

Beginn:

15.06.2011 20:00

Ende:

15.06.2011 23:00


Needs to be there, but does not need to be seen by a visitor Yes Wir schauen uns die Aufzeichnung von Congress Vorträgen an. Du bist herzlich eingeladen, in den Clubräumen im Mexikoring 21 aufzutauchen und mit uns die Talks anzuschauen und zu diskutieren. Es wird Getränke und Knabberkram zu moderaten Preisen geben. Falls Du kein CCC-, CCCHH- oder Attraktor e.V.-Mitglied bist, macht das überhaupt nichts: Alle Gäste sind gern gesehen. :-)

Weitere Informationen unter Chaotic Congress Cinema.

Android geolocation using GSM network

"Where was Waldroid?"

We introduce a new forensic technique that allows to collect users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few hours or days.

The attack is based on GSM BTS cell location and little-known Android logging features and can be extended to track a user's activity over long periods of time.

We will also show how to perform the attack locally and remotely, and ways to protect against these techniques, as well as forensic applications and privacy concerns.

As a part of the presentation we plan to show a live demonstration of both local and remote attacks to retrieve geolocation and activity history of targeted phones. The graphical mapping tool used for the presentation will be released as open source.

Talk keywords: mobile phone hacking, geolocation, android, privacy, forensics

Outline:


  1. . WHY ANDROID?
  2. . GEOLOCATION: DIFFERENT APPROACHES
  3. . ATTACK VECTORS
  4. . SPYING USERS... (GETTING MORE THAN LOCATION: TRACKING CALLS&SMS)
  5. . HOW TO PROTECT?
  6. . TOOL DEMO



http://events.ccc.de/congress/2010/Fahrplan/events/4151.en.html

http://ftp.ccc.de/congress/27C3/mp4-h264-HQ/27c3-4151-en-android_geolocation_using_gsm_network.mp4

Reverse Engineering the MOS 6502 CPU

3510 transistors in 60 minutes

The MOS 6502 CPU, which was designed in 1975 and powered systems like the Apple II, the Atari 2600, the Nintendo NES and the Commodore 64 for two decades, has always been subject to intense reverse engineering of its inner workings. Only recently, the Visual6502.org project has converted a hi-res die-shot of the 6502 into a polygon model suitable for visually simulating the original mask at the transistor level. This talk will present the way from a chip package to a digital representation, how to simulate transistors in software, and new insights gained form this research about 6502 internals, like "illegal" opcodes.

The presentation only requires a basic understanding of assembly programming and electronics, and is meant to teach, among other things, the methods of efficient and elegant chip design used in the early years of integrated CPUs. The talk consists of three parts. The first part, "6502 from top down", describes the programmer's model, as well as the basic layout of the components of the CPU. In the second part, "6502 from bottom up", we describe how to decap and photograph chips, convert each physical layer of the chip into a polygon model, and how to finally convert this into a network of wires and transistors suitable for logic simulation. The third part, "6502 from the inside out", explains the inner workings of the CPU: how the logic blocks work together, how an instruction is decoded by the PLA ROM into controlling these blocks and busses, and how details like interrupt delivery work. Finally, this information can be used to describe and explain undocumented behaviour, like illegal opcodes and crash instructions, and explain bugs like the BRK/IRQ race, the ROR bug and spurious reads and writes in certain situations.

Links

+ `The Visual 6502 (JSSim) <http://visual6502.org/JSSim/index.html>`__ + `6502 on www.pagetable.com <http://www.pagetable.com/?cat=12>`__



http://events.ccc.de/congress/2010/Fahrplan/events/4159.en.html

http://ftp.ccc.de/congress/27C3/mp4-h264-HQ/27c3-4159-en-reverse_engineering_mos_6502.mp4

Diese Seite wurde zuletzt am 23. Mai 2011 um 11:24 Uhr geändert. Diese Seite wurde bisher 1.631 mal abgerufen.