Hacker News new | past | comments | ask | show | jobs | submit login

Well, they don't really care about software attacks as much since those don't make them as much money. It's also fairly difficult for a remote hack because everything leaving the console has to go through an IPSEC tunnel to pass cert (at least on the 360).

And you'd be surprised how secure you can get a game console these days from a hardware perspective. For instance, on the 360, all stacks and everything in the hypervisor is encrypted with a per boot random key and hashed as it leaves L2 for main memory. If the hash doesn't match on the way back, the system resets. You're very protected from DMA attacks. Particularly of the kind that that's easily reproducible and able to be sold in mass.




The console security was good work. They wisely applied the tech being developed by academics and industry. There's a number of similar tech designed to stop leaks, protect control flow, and so on with crypto in SOC. I can dig up and post some of you'd like.


Yeah, I'd love to read that if it's not too much effort. : )


First that was easier than AEGIS was SP/Bastion:

http://palms.ee.princeton.edu/sp_bastion

SecureME's cloaking was interesting:

https://docs.google.com/file/d/0B1i_Zf52vJctMTA4YTI1MmUtNzdj...

HIDE - an infrastructure for efficiently protecting information leakage on the address bus http://www.cc.gatech.edu/people/home/santosh/papers/asplos20...

Using address independent seed encryption and bonsai Merkle Trees to make secure processors OS- and performance-friendly http://www.ece.ncsu.edu/arpers/Papers/micro07-brian.pdf

Embedded Software Security through Key-Based Control Flow Obfuscation http://engr.case.edu/bhunia_swarup/papers/C/C80.pdf

Memory encryption: Survey of Existing Techniques http://www.thayer.dartmouth.edu/tr/reports/tr13-001.pdf

ASIST - architecture support for instruction set randomization http://www.ics.forth.gr/_publications/papadog-asist-ccs.pdf

Hardware architectures for software security http://scholar.lib.vt.edu/theses/available/etd-10112006-2048...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: