Is a responsible disclosure for hardware-based vulnerabilities even possible?

In the last decade side-channel attacks like fault injection attacks (e.g., voltage glitching attacks) have been used to bypass JTAG locks or read-out memory protections. Such vulnerabilities might not be easy to prevent. They can be cause… Continue reading Is a responsible disclosure for hardware-based vulnerabilities even possible?

Is there any way to detect, whether a USB host actually loaded the driver for the USB device I connected?

Let’s assume I have a device which is a blackbox for me. This could be an IoT device I’d like to examine in a pen test. Let’s further assume the device has a USB port. One thing I’d like to know is:

If I attach a USB device… Continue reading Is there any way to detect, whether a USB host actually loaded the driver for the USB device I connected?