USENIX Security '19 Technical Sessions
> The full Proceedings published by USENIX for the conference are available for download below. Individual papers can also be downloaded from the presentation page.
2019 Pwnies Award Nominations
Shit happened. Mistakes were made.
Abstract Aerial Art
> Taken from a top-down perspective, every aerial photograph we take is of a real place on our planet. We like to compose our images as artworks rather than traditional photographs. Other than slight colour and contrast enhancements none of our images are manipulated in any way. As we always say, “the point is not to work out what it is, but to show how weird and wonderful the world can look from above”.
Prints for sale, but free to look.
Movie plots, visualized.
Sex and Psychological Operations
> Warning! These historical wartime images are sexually explicit.
> Would it surprise you to know that all the major combatants involved in World War II used pornography as part of their psychological operations (PSYOP) strategy?
507 Mechanical Movements
> This is an online edition of the classic technical reference Five Hundred and Seven Mechanical Movements by Henry T. Brown.
> This site contains the original illustrations and text from the 21st edition of the book, published in 1908. It also includes animated versions of the illustrations, and occasional notes by the webmaster.
Iconic consoles of the IBM System/360 mainframes, 55 years old
> The IBM System/360 was a groundbreaking family of mainframe computers announced on April 7, 1964. Designing the System/360 was an extremely risky “bet-the-company” project for IBM, costing over $5 billion. Although the project ran into severe problems, especially with the software, it was a huge success, one of the top three business accomplishments of all time. System/360 set the direction of the computer industry for decades and popularized features such as the byte, 32-bit words, microcode, and standardized interfaces. The S/360 architecture was so successful that it is still supported by IBM’s latest z/Architecture mainframes, 55 years later.
> The lower part of the Model 30 console was used for operator intervention. Note the binary-to-hexadecimal conversion chart below the hexadecimal dials.
While we’re looking: http://www.righto.com/2019/04/a-look-at-ibm-s360-core-memory-in-1960s.html
A Huge Collection of Apollo 11 Press Kits
> When Apollo 11 landed two men on the Moon and returned them safely to Earth, thousands of people at NASA were joined in the effort by dozens of companies that did everything from building the spacecraft to providing the cameras for the mission. Each of those companies was understandably proud of their involvement and wanted to use the mission to drum up interest in their products and services. Marketing strategist David Meerman Scott has been collecting the press kits produced by the Apollo contractors and has made them available online for free download in PDF format.
Main link: https://www.apollopresskits.com
Explaining Code using ASCII Art
> People tend to be visual: we use pictures to understand problems. Mainstream programming languages, on the other hand, operate in an almost completely different kind of abstract space, leaving a big gap between programs and pictures. This piece is about pictures drawn using a text character set and then embedded in source code. I love these! The other day I asked around on Twitter for more examples and the responses far exceeded expectations (thanks everyone!). There are a ton of great examples in the thread; here I’ve categorized a few of them. Click on images go to the repositories.
> Contemporary science fiction often feels fixated on a sort of pessimism that peers into the world of tomorrow and sees the apocalypse looming more often than not. At a time when simply reading the news is an exercise in exhaustion, anxiety, and fear, it’s no surprise that so many of our tales about the future are dark amplifications of the greatest terrors of the present. But now more than ever, we also need the reverse: stories that inspire hope.
> That’s why, starting on January 14th, we’ll be publishing Better Worlds: 10 original fiction stories, five animated adaptations, and five audio adaptations by a diverse roster of science fiction authors who take a more optimistic view of what lies ahead in ways both large and small, fantastical and everyday.
Windows 98 Icons are Great
> In my opinion, the UI design of Windows peaked in the late 1990s. The classic, utilitarian icons from Windows 98 just look amazing.
> If you’re looking an nostalgic way to scroll through the whole collection of Windows 98 icons (including the many icon versions embedded in each ico file), check out win98icons.alexmeub.com.
Information is Beautiful Awards 2018: The Winners
> Let’s raise a glass to dataviz that pushes boundaries, illuminates truth, and celebrates beauty. Thank you to everyone who joined us on the Information is Beautiful Awards journey this year - now see which entries took home trophies at tonight’s spectacular ceremony.
Another collection: https://www.wsj.com/graphics/year-in-graphics-2018/
Cyber Brief: Cryptolog
> Five years ago, the National Security Agency (NSA) released 136 issues of its internal Cryptolog periodical spanning 1974 through 1997. The collection offered a look into the some of the discussions being held within one of America’s most secretive intelligence agencies. Today the GWU-based National Security Archive is providing a complete index of all 1,504 items in the declassified collection, including but not limited to articles, interviews, and puzzles.
The City That Shaped The New Yorker
> Like so many figures who come to be enshrined as “quintessentially New York,” Harold Ross, the founder and first editor of this magazine, was an outsider who arrived in the big city nursing an ambition.
> Ross subsisted on nicotine, coffee, and nerves. The hours he kept were horrible, and his three marriages failed. But he fulfilled his dream. The New Yorker found its footing during the Depression. And although the magazine began to venture far beyond midtown with the start of the Second World War, the city remained an essential terra firma, a spirit and a home.
> This week, while we digest one holiday and prepare for more, we’ve decided to open the archive and republish a sampling of New York stories, New York essays, New York poems, and New York drawings. There’s even a classic New York cover, by the Mexican artist Matías Santoyo. All the pieces you’ll find in this issue, fiction and nonfiction, are set in the city, and all are deeply personal.
Maps, but maybe not suited for traditional navigation.
Demonstration of various hardware effects
> This repository demonstrates various hardware effects that can degrade application performance in surprising ways and that may be very hard to explain without knowledge of the low-level CPU and OS architecture. For each effect I try to create a proof of concept program that is as small as possible so that it can be understood easily.
> Those effects obviously depend heavily on your CPU microarchitecture and model, so the demonstration programs may not showcase the slowdown on your CPU, but I try to make them as general as I can. That said, the examples are targeting x86-x64 processors (Intel and AMD) and may not make sense on other CPU architectures. I try to make them compatible with Windows, but they are mainly tested on Linux.
Archives of POC2018
> Denis Kolegov, Oleg Broslavsky, “WebGoat.SDWAN.Net in Depth”
> En He, Jiashui Wang “Hacking Android VoIP for Fun and Profit!”
> Gmliu, “Windows Kernel Fuzzing”
> Jaanus Kääp, “Document parsers “research” as passive income”
> Jiafeng Li, Zuotong Feng, “How to Exploit Blockchain Public Chain and Smart Contract Vulnerability”
> Jin Liu & Chong Xu, “Pwning Microsoft Edge Browser: From Memory Safety Vulnerability to Remote Code Execution”
> Kang Li, “Practical evading attacks on commercial AI image recognition services”
> Liang Chen, “Era of iOS 12 with A12: End of iOS War?”
> Lidong LI & Naijie XU, “802.11 Smart Fuzzing”
> Ned Williamson, “Exploiting Chrome IPC”
> Nikita Tarakanov, “Automating Windows Kernel Pool Overflow/Corruption Exploits Development”
> Samuel Groß, “IPC MitM: Exploiting a Fun Logic Bug for Kernel-Mode Code Execution on MacOS”
> Tielei Wang, Hao Xu, “IOService Becomes a Grandpa”
> WYP, “Vulnerability analysis of Z-wave products used in Korea”
> Yannay Livneh, “Baby I can drive your car: remotely hacking Telematics CAN-connected devices”
> Yongtao Wang, Sai Cheng, Jie Fu, “SSRF To RCE In Java ”
> Yunhai Zhang, “Diving into Windows Defender Application Guard”
A Visual History of Computing 1945-1979
2018 Photomicrography Competition
1000 links for the price of one.