asteroza + emulation   43

BlackSquid Slithers Into Servers and Drives With 8 Notorious Exploits to Drop XMRig Miner - TrendLabs Security Intelligence Blog
Using sandbox usernames and installing VMware tools on a physical computer as a cheap defense method are decent ways to deceive malware too...

The list of usernames is

malware  deception  defense  fake  windows  username  sandbox  emulation  humor 
june 2019 by asteroza
The Sound of Pixels
Recreating sound from images/video alone, sorta like lip reading. But it actually seems to pull off making music again (I suppose hirez video might be necessary)
deep  machine  learning  computer  vision  audio  sound  emulation  simulation  replication  music 
november 2018 by asteroza
[1711.03467] Worm-level Control through Search-based Reinforcement Learning
Using a worm brain emulator to balance a virtual pole via learning, without writing code
biomimicry  machine  learning  neural  network  worm  brain  emulation 
february 2018 by asteroza
ObamaNet: Photo-realistic lip-sync from text
Lyrebird moves to video. Only a few more steps before the average person can't distinguish from real video. Which leads to the endgame of never trusting any video, ever.
deep  learning  TTS  text-to-speech  sppech  machine  generated  video  lipsync  voice  emulation 
december 2017 by asteroza
fr0gger/RocProtect-V1: Emulating Virtual Environment to stay protected against advanced malware
Stuffing virtual machine artifacts into a physical machines as wolfskin defense against attackers
virtual  machine  environment  emulation  security  defense  wolfskin 
november 2017 by asteroza
BankVault - Simple technology that secures online transactions
Sorta paranoid bank access setup, using nested VM setup to run a hardened interface/browser
nested  virtualization  emulation  javascript  browser  security 
july 2017 by asteroza
Sweet jebus, this is running Windows 2000 on top of QEMU on top of linux on top of javascript running in a browser window. Makes a browser a fat client pulling an secure OS image from cloud storage (assuming you vaguely trust your machine)...
javascript  linux  QEMU  windows  nested  virtualization  emulation 
july 2017 by asteroza
Emergence of Polymorphic Mating Strategies in Robot Colonies
Interesting use of robot stand-ins ("cyber rodents") for evolutionary biology simulation to see emergent behavior. Though they did use hermaphroditic robots this time around...
robotics  mating  simultation  cyber  rodent  robot  evolutionary  biology  simulation  emulation  hermaphrodite  genotype  research  behavior  modeling  emergent  colony  evolution  Delicious 
april 2014 by asteroza
Android KitKat | Android Developers
HCE is an end run around cellphone carriers excessively controlling the SE (secure element) portion of NFC, effectively locking out competitors in the contactless mobile payments space. But now Visa/MasterCard have announced HCE support for cloud storage of credit cards, effectively breaking the carrier stranglehold and opening the way for more Google Wallet like services..
HCE  host  card  emulation  NFC  SE  secure  element  android  4.4  kitkat  programming  development  contactless  mobile  payment  system  software  Delicious 
march 2014 by asteroza

related tags

4.4  ACK  actor  adversary  AI  alarm  alpha  analysis  android  anonymity  antiscanning  antisnooping  apex  app  arduino  armory  attack  audio  balafire  barcode  behavior  biology  biomimicry  BIOS  blueteam  brain  browser  call  carbon  card  clock  cloning  cloud  colony  compatibility  computer  console  contactless  copying  CORE  counterscanning  cryptanalysis  cryptography  cyber  debugging  DEC  DECalpha  deception  decode  deep  defense  Delicious  desktop  development  devices  DFIR  DIY  EDR  education  electric  electroncis  electronics  element  emergent  emitter  emulating  emulation  emulator  encode  encryption  enigma  environment  evolution  evolutionary  external  fake  false  fashion  filament  fire  firewall  flame  FPGA  gadget  game  gaming  GCHQ  generated  generator  genotype  GPU  guardian  guide  hacking  hardware  HCE  health  hermaphrodite  HID  history  host  howto  HP3000  humor  idendtity  information  IR  javascript  kernel  keyboard  kitkat  KQEMU  Kyp-Go  laser  layer  learning  legacy  library  light  lightbulb  lighting  linux  lipsync  LUMI  machine  magnetic  malware  management  mask  mating  microsoft  MitM  MITRE  mobile  modeling  mooltipass  music  natural  NES  nested  netscape  network  networking  neural  neuroscience  NFC  nintendo  NIST  office  open  opensource  OpenVMS  optical  OS  oscillating  p2p  parallelism  password  payment  PDP-11  pentesting  personal  port  portability  portscanning  portspoof  PowerShell  privacy  programming  protection  protocol  proxcard  proximity  proxy  python  QA  QEMU  reading  realtime  redteam  reference  replication  research  response  RFID  robot  robotics  rodent  router  routing  RTOS  sandbox  scanning  SE  secure  security  serial  service  setup  SIMD  simulating  simulation  simulator  simultation  SIP  sleeping  sleepware  SNES  software  sound  SPARC  spoofing  sppech  SSE  SSE3  storage  store  stress  stripe  sunrise  swipe  SYN  synthesis  system  tag  TCP  test  testing  text-to-speech  threat  tools  training  TTS  tutorial  Ubuntu  USB  USBarmory  username  utilities  VAX  vectorization  video  virtual  virtualization  vision  VM  VMS  voice  WAN  WANem  wifi  windows  wine  WinSIP  wolfskin  worm  Xenomai/SOLO 

Copy this bookmark: