diamond_fulldiamonddiamond_halfdiamond_eurosearch-iconmenuchat-iconclose-iconenvelope-iconsmartphone-call-icon

Blog & News

Latest news from SCHUTZWERK

preview-image for Logo of the CacheWarp attack

CacheWarp: Dropping one write to take over AMD-SEV

November 23, 2023 #attacks #news #reverse engineering

On 2023-11-14 the CISPA Helmholtz Center for Information Security published a new Attack on AMD-SEV called CacheWarp (CVE-2023-20592), in which I am one of the original authors. This attack allows a malicious hypervisor to drop memory writes on an encrypted VM using the invd instruction. Due to the difficulty of the setup, a feasible attack should only drop memory once to achieve its goal. In this article, we examine how one memory drop is enough to break openssh and sudo to completely hijack the victim system.

preview-image for Telechips and SCHUTZWERK announce their SoC cybersecurity partnership

Cooperation with TeleChips to strengthen their SoC cybersecurity

August 22, 2023 #news #automotive security #embedded security

We are excited to announce that Telechips, a leading supplier of System-on-Chip (SoC) components for automotive In-Vehicle Infotainment and cockpit solutions based in Seoul, South Korea, has selected SCHUTZWERK as their strategic partner for SoC cybersecurity assessments. Telechips has chosen to partner with SCHUTZWERK, a renowned and experienced provider of automotive and embedded security assessments , to conduct comprehensive cybersecurity assessments of their entire SoC portfolio through the end of 2024.

preview-image for Kubescale Title Image

Kubernetes RBAC: Paths for Privilege Escalation

July 17, 2023 #kubernetes #cloud #container #attacks

Kubernetes is a widely used open-source container orchestration system that helps to reduce workloads when dealing with container management in distributed systems. Its built-in authorization module is enabled by default and provides authorization mechanisms that prevent unauthorized access to resources. However, certain permissions enable their subject to escalate their privileges to a potentially Cluster compromising extent.

preview-image for Title image

The PROBoter software framework

July 10, 2023 #proboter #embedded security #secforcars #toolrelease

The last part of the PROBoter series showed how innovative algorithms can help an embedded system pentester to analyze recorded voltage signals of an unknown PCB. Besides basic signal characteristics, these algorithms can link signal lines and identify communication buses typically found on PCBs like I2C or SPI. In this final post of the PROBoter series, we draw the big picture of the PROBoter software framework. In parallel to the release of this post, all missing services forming the framework are released on the PROBoter Github repo.

Blog & News Archive

Blog & News Archive

Latest 2022 2021 2020