Memory predecryption: hiding the latency overhead of memory encryption
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Research lessons from hardware hacking
Communications of the ACM - Hacking and innovation
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Proceedings of the 33rd annual international symposium on Computer Architecture
Efficient data protection for distributed shared memory multiprocessors
Proceedings of the 15th international conference on Parallel architectures and compilation techniques
Security analysis of the diebold AccuVote-TS voting machine
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Making secure processors OS- and performance-friendly
ACM Transactions on Architecture and Code Optimization (TACO)
XFT: a forensic toolkit for the original Xbox game console
International Journal of Electronic Security and Digital Forensics
Compatibility, competition, and control in trusted computing environments
Information Security Tech. Report
Proceedings of the 37th annual international symposium on Computer architecture
Detecting/preventing information leakage on the memory bus due to malicious hardware
Proceedings of the Conference on Design, Automation and Test in Europe
An analysis of secure processor architectures
Transactions on computational science VII
Workload characterization of cryptography algorithms for hardware acceleration
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
Modding as a basis for developing game systems
Proceedings of the 1st International Workshop on Games and Software Engineering
Green secure processors: towards power-efficient secure processor design
Transactions on computational science X
Seifert's RSA fault attack: simplified analysis and generalizations
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Inspection resistant memory: architectural support for security from physical examination
Proceedings of the 39th Annual International Symposium on Computer Architecture
Improving virtualization security by splitting hypervisor into smaller components
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Pasture: secure offline data access using commodity trusted hardware
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Hi-index | 0.00 |
From the Publisher:This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification that teach basic hacking techniques as well as essential reverse engineering skills. Full discussions of the Xbox security mechanisms and other advanced hacking topics are here, along with practical pointers from hacking gear resources to soldering techniques. Xbox owners are shown exactly how to increase the value and utility of their Xbox, as well as problem-solve. The book covers the social and political implications of hacking, profiles the humans behiind the hacks in candid interviews, and includes a chapter written by the Electronic Frontier Foundation (EFF) on the rights and responsibilities of hackers. Debugging tips, a hardware reference guide, and a discussion of the latest trends and vulnerabilities in secure PC platforms wrap it up.