Archive for the ‘Blog’ Category

Based on the previous introduction, we now work to test what is published to see the current status. Initial Testing Our initial goal was to confirm that the gyroscope and accelerometer could sample at frequencies high enough (and with low enough noise) to preserve audio data. According to the Nyquist-Shannon sampling theorem, we can reconstruct… » Read More

This multi-part series explores how machine learning can enhance eavesdropping on cellular audio using gyroscopes and accelerometers — inertial sensors commonly built into mobile devices to measure motion through Micro-Electro-Mechanical Systems (MEMS) technology. The research was conducted over the summer by one of our interns, Alec K., and a newly hired full-time engineer, August H. Introduction… » Read More

At Caesar Creek Software, we routinely perform cybersecurity assessments of medical devices to help companies achieve FDA 510(k) approval for new products. As part of our ongoing research and training, we also conduct internal audits of popular medical devices to stay current with the latest security trends and provide our engineers with hands-on experience. In… » Read More

Previously, we were examining the instruction set. Now, it is time to conduct some microarchitectural attacks! Investigating Microarchitectural Attacks This page gives an overview of some of the microarchitectural attacks we have attempted on the Loongson dev board and our corresponding findings. Spectre Our first successful proof of concept (PoC) was for Spectre-v1. This led… » Read More

Previously, we discussed the dev board and Linux setup. Now, time to fuzz the instruction set. Loongshaker Overview Our first goal was to search for hidden or buggy instructions in the new LoongArch architecture. LoongArch is a RISC architecture with fixed-width (32-bit) instructions. As such, we decided to port armshaker to LoongArch. This program uses… » Read More