Look on this ”securityadvertisment then and hmmm…

 

Maybe several should look closer on those 1 and 0

 

June 9th 2006

 

European Stocks Rebound, Paced by Infineon Technologies, Nokia, Total, BHP

European stocks rebounded from their lowest level this year on speculation that this week's slide overshot the prospects for earnings growth.

http://news.ft.com/cms/s/83a8247e-e04c-11da-9e82-0000779e2340.html

 

Infineon plans to list chip arm on NYSE
By Gerrit Wiesmann in Frankfurt
Published: May 10 2006 19:36 | Last updated: May 10 2006 19:36


infineonInfineon, the German semiconductor group, wants to sell shares in its memory-chip unit on the New York Stock Exchange, marking the biggest offer by a European company in years.

The ARM Sophia Design Center was set up in the year 2000 and is involved in microprocessor core design - products such as SecurCore, TrustZone Architecture, ARM1176 and more recently MPCore.

ARM Builds Security Foundation For Future Wireless And Consumer ...

Palm OS licensees will be pleased with the steps ARM is making toward achieving both goals by introducing the TrustZone architecture." ...
www.arm.com/news/323.html - 32k - Cachad - Liknande sidor

 

http://arm.convergencepromotions.com/catalog/87.htm

The ARM TrustZone Architecture Extension implements a hardware-isolated execution environment within the microprocessor core itself.

Since the security elements of the system are designed into the core hardware, security issues surrounding proprietary, non-portable solutions outside the core are removed. In this way, security is maintained as an intrinsic feature at the heart of every device, with minimal impact to the core area or performance, while enabling developers to build any additional security, for example cryptography acceleration, onto the secure hardware foundation.

The ARM TrustZone Architecture Extensions are now implemented in the
ARM1176JZ(F)-S CPU and are an integral part of the ARM roadmap for application CPUs.

ARM Holdings PLC – Preliminary results For The Year Ended 31 ...

Two new ARM11 family cores , the ARM1156T2 ( F ) - S ™ and the ARM1176JZ ( F ) - S ... Revenues from non - CPU licensing , which comprised 17 % of total ...
www.armsemi.com/ir/financialnews/4739.html - 93k - Kompletterande resultat - Cachad - Liknande sidor

 

Has to be the correct one then..

Tool boots Windows CE on simulated ARM processor Jun. 08, 2005 ARM has released its first "fast virtual prototype" model based on new ARM code simulation technology. The first model in the family, the RealView Real Time System Model for the ARM1176JZ(F)-S processor, typically executes code at more than 100 MIPS (million instructions per second) on a 3GHz PC under Windows, according to the company. The new Real Time System Model and its supporting technology enable booting of target systems such as Windows CE, Linux, or Symbian "in a few seconds" when running on a standard PC host, ARM says.

http://www.arm.com/news/9368.html

In addition to adding fast models and simulation technology to its RealView product line, ARM is extending the capabilities of its processor-centric MaxCore® tools to enable flexible modeling of complete systems.  The new graphical design entry tool enables easy creation and configuration of system models, with CPUs as well as system components and peripherals being described in the powerful LISA+ language. Processor and system models from MaxCore tools can be directly imported into the SystemC-compliant MaxSim™ tool and combined with other models of the MaxLib™ library for detailed benchmarking and system analysis. The robust cycle-based interfaces, and cycle-based execution of MaxSim technology ensures best-in-class model interoperability and simulation speed for SystemC simulation. The MaxCore and MaxSim tools, together with the MaxLib model library are all part of the ARM RealView solution targeted at system architects. The RealView Developer Suite and fast system models are targeted at software developers.

Hmm

http://www.electronicstalk.com/news/ank/ank207.html

Processor and system models from MaxCore tools can be directly imported into the SystemC-compliant MaxSim tool and combined with other models of the MaxLib library for detailed benchmarking and system analysis

Aha

http://phx.corporate-ir.net/phoenix.zhtml?c=101665&p=IROL-NewsText&t=Regular&id=324146&

DSP Group, Inc. (Nasdaq:DSPG), the world leader in the development and licensing of Digital Signal Processor (DSP) cores and AXYS Design Automation, Inc. announced today the immediate availability of the fast cycle-accurate model for the popular TeakLite DSP core from DSP Group. The simulation model was developed using AXYS Design's MaxCore(R) tool and the processor description in C-based Language for Instruction Set Architectures (LISA). The MaxCore model delivers over one million cycles per second on a 1GHz Pentium host and supports scalable multicore simulation and debugging.

 

DSP Group's thorough set of hardware test vectors has been applied to verify the functional match between the simulation model and its register transfer level (RTL) reference on a cycle by cycle basis.

Many electronic communication and consumer devices being created for the current market require Digital Signal Processing capabilities using limited power supplies and fast processing times to enable these devices to function efficiently. The TeakLite core is a 16-bit general-purpose DSP core targeted for applications requiring low power consumption, low bandwidth and high processing volume such as 2G and 2.5G wireless communication, as well as Internet audio formats, including MP3 and WMA, and Voice-over-IP phones

Early pre-silicon verification of hardware and software reduces the need for costly silicon re-spins and accelerates the product development cycle; thereby shortening the overall time-to-market. In addition to DSP Group's SmartCores(TM), the MaxLib library contains a rich set of models for other popular processor cores and System-on-a-Chip (SoC) components from ARM, MIPS and others.

http://www.google.se/search?hl=sv&q=The+MaxCore%28TM%29+Developer+Suite+&meta=

http://www.arm.com/products/DevTools/MultiICE.html

 

 

 

Securecore?

SecurCore SC200

The SecurCore SC200 core macrocell incorporates Jazelle Java acceleration for Java ... The SecurCore family supports the ARM and Thumb instruction sets, ...
www.arm.com/products/CPUs/SecurCore_SC200.html - 45k - Cachad - Liknande sidor
[
Fler resultat från www.arm.com ]

 

Ok

http://www.infoworld.com/article/05/06/27/HNarmjava_1.html

Jazelle RCT builds on a previous version of the technology known as Jazelle DBX (direct bytecode execution), Porthouse said. By adding new instructions and modifying other parts of the Jazelle technology, Arm was able to support the higher-performance JIT and AOT compiler technology while minimizing the amount of excess code, he said.

Arm will make Jazelle RCT available with its Cortex family of processor

Aha

http://www.arm.com/products/esd/jazelle_dbxoverview.html

Key benefits of Jazelle DBX technology

*       High performance and oustanding user experience

Jazelle DBX technology typically increases the performance of a highly optimised commercial JVM by around 2 to 4 times, when running benchmarks or complex MIDP 2.0 applications. In addition, all Java bytecodes are restartable and there is no overhead on real-time performance. User experience is not just about a high top speed: Jazelle DBX technology-enabled JVMs exhibit lightning fast application start-time and high responsiveness to user interaction.

*       Small and low power

Approximately 12k gates are required to implement the ARM Java extensions - much smaller than most dedicated processors or co-processors, which are typically between 60-100k gates. The minimal complexity of the additional logic required to implement the extensions keeps power consumption low and system integration simple, without compromising performance. Jazelle DBX technology is tightly integrated with the core architecture and able to make use of the processor cache -important for reducing power consumption and maximising performance.

*       Ease of integration

Java co-processors require extensive integration with the main processor core and system memory. They are also difficult to integrate with an existing OS and Java platform. Jazelle DBX technology is extremely quick and easy to integrate into a JVM and underlying OS - typically taking only a few days. ARM are also working with OS vendors and Java platform vendors to ensure they offer support for Jazelle DBX technology and the time-to-market for DBX-enabled products is extremely short.

 

The J2ME Mobile Information Device Profile (MIDP) specification was introduced just over two years ago to provide an open development platform for resource-constrained networked devices, such as commercial mobile phones. Since its introduction, the MIDP profile is proving to be the leading technology platform worldwide for developing this brand of mobile applications. Supporters include mobile carriers from around the world, including NTT DoCoMo, Sprint, and Vodafone, in addition to device manufacturers like Nokia, Motorola, and Research In Motion. The November 2002 release of version 2.0 of the specification introduced substantial new capabilities to the base platform that will enable developers to create more effective and powerful applications with less effort.

Vodafone's mobile phone operation in Greece has become embroiled in a phone-tapping scandal, nicknamed the Greek Watergate feb 2006

http://www.google.se/search?hl=sv&q=vodaphone+scandal+greece&meta=

With the introduction of PKI functionality into the specification, MIDlets can now establish connections using the HTTPS and SSL/TLS protocols that are necessary for secure handling of sensitive information like credit card numbers or passwords. MIDP 2.0 also provides a number of optional low-level networking capabilities for TCP/IP sockets and UDP/IP datagrams, in addition to local serial port connections.

By creating an entry in the application descriptor file or through the PushRegistry class, a MIDlet can register an inbound connection listener. When the MIDlet is not running, the MIDP platform's application management software (AMS) listens for an inbound request. When a request is received, the AMS launches the associated MIDlet using the startApp method and passes along the connection for processing.

This is significant in that a MIDlet can provide services even when it is not actively running. It is also significant because it provides developers with the means to more efficiently retrieve event-based information. For instance, a MIDlet can subscribe to a RSS news feed alert service, requesting to be notified when new headlines are published -- in addition to making an entry in the push registry. Seconds, minutes, or perhaps even days later, when that feed is updated, the service pushes a notification message to the subscribing MIDlet. The MIDlet did not have to stay active, nor did it have to continuously poll the server for updates. This is a classic example of asynchronous messaging using publish/subscribe, and is one of the ways push capabilities can be effectively utilized.

The original MIDP specification did not include OTA provisioning; it was later introduced as a recommended practice in a separate document. In the MIDP 2.0 specification, OTA provisioning becomes compulsory in order to establish a concrete standard for security and interoperability between service providers and Java-enabled MIDs.

Nice….

http://www.security.org.sg/code/jspreverse.html

http://www.google.se/search?hl=sv&q=java+applet+security+risk+2006&meta=

funny? I found an article regarding javapplets and its interaction creates backdoors… hmm that webpage is gone…funny…?

 

http://www.arm.com/news/ARM_In_The_News.html

 

and here

http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20060522005402&newsLang=en

 

payment terminal secure no backdoors ala pumping the warehouse figure solution?

 

VeriFone Vx 670 Achieves PCI Security Approval; Industry's Smallest All-in-One Portable Wireless System Available Worldwide with Wi-Fi or GPRS

 

VeriFone Holdings, Inc. (NYSE: PAY) today announced worldwide availability of the PCI-approved VeriFone Vx 670. The Vx 670 portable payment system meets the Payment Card Industry (PCI) requirements established by Visa International and MasterCard International to ensure that PIN-based payment transactions meet the highest level of security.

 

Hmm verifon, verisign, veri? Que?

 

"The Vx 670 complies with the industry's most stringent standards for security protections to guard against fraud and misuse

And here

The Vx 670 utilizes higher-speed 802.11g Wi-Fi for mobile, always-on connectivity, particular suited to TablePAY and CarsidePAY use, with transactions often taking less than a second to complete, compared to 12-14 seconds or more for dial transactions. The Vx 670 also offers WPA-level encryption security, the benchmark for enterprise wide Wi-Fi security. A GPRS communications option supports DeliveryPAY for mobile services of all types.

 

It utilizes WPA-PSK (pre-shared keys) to protect Wi-Fi transactions

 

Baha again…sharpen up man…are you on the high again?

 

http://blogs.zdnet.com/Ou/index.php?p=9

but the simpler implementation of WPA called WPA PSK (Pre-Shared Keys). This really wasn't a surprise to the security community due to the general nature of PSK implementations, the difference now is that a weaponized form of this exploit has been released in to the wild. In actuality, two WPA Cracking tools were independently released last week. One toolcame from Takehiro Takahashi (a student at Georgia Tech) and the other tool came from Joshua Wright (author of ASLEAP). Both tools clearly illustrate the futility of the reliance on passwords or passphrases for authentication.

The WPA standard itself is fairly broad and covers Wireless LAN security for both the Enterprise and Home environments. PSK mode was really designed for the Home and Home Office environment where it was very unlikely that an Authentication infrastructure is in place to support a strong authentication protocol such as PEAP or TTLS. Well all that may change thanks to a very creative group from the College of Computing at Georgia Tech who formed TinyPEAP. The original group was comprised mainly of 2 recent alumni Brian Lee and Jim Gruen along with the guidance of Dr. Wenke Lee and Dr. Richard Lipton. Recently, they've added Takehiro Takahashi (mentioned above) to the teamwho is near graduation himself fromGeorgia Tech. TinyPEAP is a prototype Authentication server that is currently being tested as a plug-in on Linksys Wi-Fi gear. Rather than being satisfied with WPA PSK mode which has now beenprovento be susceptible to dictionary attacks, TinyPEAP allows the home user to implement the same type of strong security that was once exclusive to the Enterprise.I'll be keeping a close eye on this very exciting product and I'll be giving them lots of suggestions and feedback on this project so stay tuned!

Tools

http://64.233.183.104/search?q=cache:tWV_KLSno-AJ:www.wardrive.net/wardriving/tools+Takehiro+Takahashi+tool&hl=sv&gl=se&ct=clnk&cd=2

WPA Cracker is a dictionary/brute-force attacker against WiFi Protected Access (WPA). WPA takes two forms; WPA Enterprise Mode and WPA PSK (Pre-Shared Key) Mode. WPA Cracker takes advantage of an inherently vulnerable characteristics of the PSK implementation to provide users an insight that the security must be deployed properly. Operating System: Linux.

http://www.google.se/search?hl=sv&q=WPA+Cracker+&btnG=Google-s%C3%B6kning&meta=

 

So the core matters ”looks” ok but what follows after in selection of encryption algorithm wpa psk salestalks and javaapplets and its backdooring functionality despite signing…

Its simple c..p

All that after creates products not worth to have in payment systems

Want more info?

Just a simple email to kajander1@nodns.org or kajander12345@hotmail.com