continue…
Related to
BootStomp: On the Security of Bootloaders in Mobile Devices
Doping your Fitbit
22 min
Everything you want to know about x86 microcode, but…
57 min
Microarchitectural Attacks on Trusted Execution…
55 min