Look
on this ”security” advertisment
then and hmmm…
Maybe several should
look closer on those 1 and 0
June 9th
2006
European Stocks Rebound, Paced by Infineon Technologies, Nokia, Total, BHP
European
stocks rebounded from their lowest level this year on speculation that this
week's slide overshot the prospects for earnings growth.
http://news.ft.com/cms/s/83a8247e-e04c-11da-9e82-0000779e2340.html
Infineon plans to list chip arm on
NYSE
By Gerrit Wiesmann
in
Published: May 10 2006 19:36 | Last updated: May 10 2006 19:36
Infineon, the German semiconductor group, wants to sell shares in its
memory-chip unit on the New York Stock Exchange, marking the biggest offer by a
European company in years.
The
ARM Builds
Security Foundation For Future Wireless And Consumer ...
Palm
OS licensees will be pleased with the steps ARM is making toward achieving
both goals by introducing the TrustZone
architecture." ... |
http://arm.convergencepromotions.com/catalog/87.htm
The
ARM TrustZone
Architecture Extension implements a hardware-isolated execution environment
within the microprocessor core itself.
Since the security elements of the system are designed into the core
hardware, security issues surrounding proprietary,
non-portable solutions outside the core are removed. In this way, security is
maintained as an intrinsic feature at the heart of every device, with minimal
impact to the core area or performance, while enabling developers to build any
additional security, for example cryptography acceleration, onto the secure
hardware foundation.
The ARM TrustZone Architecture Extensions are now
implemented in the ARM1176JZ(F)-S CPU and are an integral
part of the ARM roadmap for application CPUs.
ARM Holdings PLC
– Preliminary results For The Year Ended 31 ...
Two new ARM11 family cores , the
ARM1156T2 ( F ) - S ™ and the ARM1176JZ ( F )
- S ... Revenues from non - CPU licensing , which comprised 17
% of total ... |
Has
to be the correct one then..
Tool boots Windows CE on simulated ARM processor Jun. 08, 2005 ARM has
released its first "fast virtual prototype" model based on new ARM
code simulation technology. The first model in the family, the RealView Real Time System Model
for the ARM1176JZ(F)-S processor, typically executes code at more than 100 MIPS (million instructions per second)
on a 3GHz PC under Windows, according to the company. The new Real Time System Model and its
supporting technology enable booting of target systems such as Windows CE,
Linux, or Symbian "in a few seconds" when
running on a standard PC host, ARM says.
http://www.arm.com/news/9368.html
In addition to adding
fast models and simulation technology to its RealView
product line, ARM is extending the capabilities of its processor-centric MaxCore® tools to enable flexible modeling
of complete systems. The new graphical design entry tool enables easy
creation and configuration of system models, with CPUs as well as system
components and peripherals being described in the powerful LISA+ language. Processor and system models from MaxCore tools can be directly imported into the SystemC-compliant MaxSim™ tool
and combined with other models of the MaxLib™ library for detailed
benchmarking and system analysis. The robust cycle-based interfaces, and
cycle-based execution of MaxSim technology ensures best-in-class model
interoperability and simulation speed for SystemC
simulation.
The MaxCore and MaxSim
tools, together with the MaxLib model library are all
part of the ARM RealView solution targeted at system
architects. The RealView Developer Suite and fast
system models are targeted at software developers.
Hmm
http://www.electronicstalk.com/news/ank/ank207.html
Processor and system models from MaxCore tools
can be directly imported into the SystemC-compliant MaxSim tool and combined with other models of the MaxLib library for detailed benchmarking and system
analysis
Aha
http://phx.corporate-ir.net/phoenix.zhtml?c=101665&p=IROL-NewsText&t=Regular&id=324146&
DSP Group, Inc. (Nasdaq:DSPG), the world leader
in the development and licensing of Digital Signal Processor (DSP) cores and AXYS Design
Automation, Inc. announced today the immediate availability of the fast
cycle-accurate model for the popular TeakLite DSP core from DSP Group. The
simulation model was developed using AXYS Design's MaxCore(R) tool and the processor description in C-based Language for
Instruction Set Architectures (LISA).
The MaxCore model delivers over one million cycles per second on a 1GHz Pentium host and supports scalable multicore simulation and debugging.
DSP Group's thorough set of hardware test vectors has been applied to
verify the functional match between the simulation model and its register
transfer level (RTL) reference on a cycle by cycle
basis.
Many electronic communication and consumer devices
being created for the current market require Digital Signal Processing
capabilities using limited power supplies and fast processing times to enable
these devices to function efficiently. The TeakLite
core is a 16-bit general-purpose DSP core targeted
for applications requiring low power consumption, low bandwidth and high
processing volume such as 2G and 2.5G wireless communication,
as well as Internet audio formats, including MP3 and WMA, and Voice-over-IP
phones
Early pre-silicon verification of hardware and
software reduces the need for costly silicon re-spins and accelerates the
product development cycle; thereby shortening the overall time-to-market. In
addition to DSP Group's SmartCores(TM),
the
MaxLib library contains a rich set of models for other popular processor cores and System-on-a-Chip (SoC) components from ARM, MIPS and others.
http://www.google.se/search?hl=sv&q=The+MaxCore%28TM%29+Developer+Suite+&meta=
http://www.arm.com/products/DevTools/MultiICE.html
Securecore?
The
SecurCore SC200 core macrocell
incorporates Jazelle Java acceleration for Java ...
The SecurCore family supports the ARM and
Thumb instruction sets, ... |
Ok
http://www.infoworld.com/article/05/06/27/HNarmjava_1.html
Jazelle RCT builds on a previous version of the technology known as
Jazelle DBX (direct bytecode execution), Porthouse said. By adding new instructions and modifying
other parts of the Jazelle technology, Arm was able
to support the higher-performance JIT and AOT compiler technology while minimizing the amount of
excess code, he said.
Arm will make
Jazelle RCT available with
its Cortex family of processor
Aha
http://www.arm.com/products/esd/jazelle_dbxoverview.html
Key benefits of Jazelle
DBX technology
High performance and oustanding
user experience
Jazelle DBX technology typically increases the performance of a
highly optimised commercial JVM by around 2 to 4
times, when running benchmarks or complex MIDP 2.0 applications. In addition, all Java bytecodes are restartable and
there is no overhead on real-time performance. User experience is not just
about a high top speed: Jazelle DBX
technology-enabled JVMs exhibit lightning fast
application start-time and high responsiveness to user interaction.
Small and low power
Approximately 12k gates are required to implement the
ARM Java extensions - much smaller than most dedicated processors or
co-processors, which are typically between 60-100k gates. The minimal
complexity of the additional logic required to implement the extensions keeps
power consumption low and system integration simple, without compromising
performance. Jazelle DBX
technology is tightly integrated with the core architecture and able to make
use of the processor cache -important for reducing power consumption and
maximising performance.
Java co-processors require extensive integration with
the main processor core and system memory. They are also difficult to integrate
with an existing OS and Java platform. Jazelle DBX technology is extremely quick and easy to integrate
into a JVM and underlying OS - typically
taking only a few days. ARM are also working with OS vendors and Java platform
vendors to ensure they offer support for Jazelle DBX technology and the time-to-market for DBX-enabled products is extremely short.
The J2ME Mobile Information Device Profile (MIDP)
specification was introduced just over two years ago to provide an open development platform
for resource-constrained networked devices, such as commercial mobile phones. Since
its introduction, the MIDP profile is proving to be
the leading technology platform worldwide for developing this brand of mobile
applications. Supporters include mobile
carriers from around the world, including NTT DoCoMo,
Sprint, and Vodafone,
in addition to device manufacturers like Nokia, Motorola, and Research In
Motion. The November 2002 release of version 2.0 of the specification
introduced substantial new capabilities to the base platform that will enable
developers to create more effective and powerful applications with less effort.
Vodafone's mobile
phone operation in
http://www.google.se/search?hl=sv&q=vodaphone+scandal+greece&meta=
With the introduction of PKI functionality
into the specification, MIDlets can now establish
connections using the HTTPS and SSL/TLS protocols
that are necessary for secure handling of sensitive information like credit
card numbers or passwords. MIDP 2.0 also
provides a number of optional low-level networking capabilities for TCP/IP
sockets and UDP/IP datagrams,
in addition to local serial port connections.
By creating an entry
in the application descriptor file or through the PushRegistry
class, a MIDlet can register an inbound
connection listener. When the MIDlet
is not running, the MIDP platform's application
management software (AMS) listens for an inbound
request. When a request is received, the AMS
launches the associated MIDlet using the startApp
method and passes along the
connection for processing.
This is significant in that a MIDlet can
provide services even when it is not actively running.
It is also significant because it provides developers with the means to more
efficiently retrieve event-based information. For instance, a MIDlet can subscribe to a RSS
news feed alert service, requesting to be notified when new headlines are
published -- in addition to making an entry in the push registry. Seconds,
minutes, or perhaps even days later, when that feed is updated, the service
pushes a notification message to the subscribing MIDlet.
The MIDlet did not have to stay
active, nor did it have to continuously poll the server for updates.
This is a classic example of asynchronous messaging using publish/subscribe,
and is one of the ways push capabilities can be effectively utilized.
The
original MIDP specification did not include OTA
provisioning; it was later introduced as a
recommended practice in a separate document. In the MIDP
2.0 specification, OTA provisioning becomes compulsory in order to establish
a concrete standard for security and interoperability between service providers
and Java-enabled MIDs.
Nice….
http://www.security.org.sg/code/jspreverse.html
http://www.google.se/search?hl=sv&q=java+applet+security+risk+2006&meta=
funny? I found an article regarding javapplets
and its interaction creates backdoors… hmm that webpage is gone…funny…?
http://www.arm.com/news/ARM_In_The_News.html
and here
payment terminal
secure no backdoors ala pumping the warehouse figure solution?
VeriFone Vx
670 Achieves PCI Security Approval; Industry's
Smallest All-in-One Portable Wireless System Available Worldwide with Wi-Fi or GPRS
VeriFone Holdings, Inc. (NYSE:
PAY) today announced worldwide availability of the PCI-approved
VeriFone Vx 670. The Vx 670 portable payment system meets the Payment Card
Industry (PCI) requirements established by Visa
International and MasterCard International to ensure that PIN-based payment
transactions meet the highest level of security.
Hmm verifon, verisign, veri? Que?
"The Vx 670
complies with the industry's most stringent standards for security
protections to guard against fraud and misuse
And here
The Vx 670 utilizes higher-speed 802.11g Wi-Fi
for mobile, always-on connectivity, particular suited to TablePAY
and CarsidePAY use, with transactions often taking
less than a second to complete, compared to 12-14 seconds or more for dial
transactions. The Vx 670 also offers WPA-level
encryption security, the benchmark for enterprise wide Wi-Fi security. A GPRS communications option supports DeliveryPAY for mobile services of all types.
It
utilizes WPA-PSK (pre-shared keys) to protect Wi-Fi transactions
Baha again…sharpen
up man…are you on the high again?
http://blogs.zdnet.com/Ou/index.php?p=9
but the simpler
implementation of WPA called WPA
PSK (Pre-Shared Keys). This really wasn't a surprise
to the security community due to the general nature of PSK
implementations, the difference now is that a weaponized
form of this exploit has been released
in to the wild. In actuality, two WPA Cracking tools
were independently released last week. One toolcame
from Takehiro Takahashi (a student at Georgia Tech)
and the other tool came from Joshua Wright (author of ASLEAP).
Both tools clearly illustrate the futility of the reliance on passwords or passphrases for authentication.
The WPA
standard itself is fairly broad and covers Wireless LAN security for both the
Tools
WPA
Cracker is a dictionary/brute-force attacker against WiFi
Protected Access (WPA). WPA
takes two forms; WPA Enterprise Mode and WPA PSK (Pre-Shared Key) Mode. WPA Cracker takes advantage of an inherently vulnerable
characteristics of the PSK implementation to provide
users an insight that the security must be deployed properly. Operating System: Linux.
http://www.google.se/search?hl=sv&q=WPA+Cracker+&btnG=Google-s%C3%B6kning&meta=
So the core matters ”looks” ok but what follows after in selection of
encryption algorithm wpa psk
salestalks and javaapplets
and its backdooring functionality despite signing…
Its simple c..p
All that after creates products not worth to have in payment
systems
Want more info?
Just a simple email to kajander1@nodns.org
or kajander12345@hotmail.com