Introducción a la arquitectura y programación sobre ARM
- August 13, 2014
- tuxotron
- Start
- Why Learn Assembly Language?
- Not a Trivial Mapping
- Instruction Sets
- Registers
- Program Counter
- Instruction Syntax
- Organisation
- Movement
- Arithmetic Instructions
- Logical Instructions
- Compare Instructions
- Barrel Shifter
- Operand2
- Immediate Values
- Branch Instructions
- Conditional Execution
- Multiply Instructions
- Single Register Data Transfer
- Addressing Modes
- Multiple Register Data Transfer
- The Stack
- A Call Chain
- Task One
- Task One - Answers
- Task Two
- Task Two - Answers
- Thumb
- Interworking
- Thumb Example
- Thumb-2
- ARM Ltd.
- Tools
- Applications
- ARM Architecture
- Early Architectures
- Architecture 4
- Architecture 5
- Architecture 6
- Architecture 7
- Summary of current ARM cores
- What’s inside various devices?
- Test
- Books
- Start
- Efficiency
- Before Tuning...
- Optimising
- Profilers
- Stuff That’s Slow on ARM
- Floating Point
- Division and Modulus
- Unaligned Data Access
- Bools
- Bitfields
- Padding
- Hoisting
- Data Drive
- Avoid Array Indexing
- Pointer Aliasing
- Pointer Chains
- Sentinels
- Loop Unrolling
- C Data Types
- Memory Access
- Local Variable Types
- Function Argument Types
- Taking a Variable’s Address
- Looping Structures
- Register Allocation
- Function Calls
- Small Functions
- Biasing Values
- Unsigned Ranges
- Base Pointer Optimisation
- References

Cada vez son más los dispositivos que salen al mercado con procesadores ARM. No sólo teléfonos móviles y tabletas, sino dispositivos embebidos y pequeños como Raspberry Pi, Beaglebone, etc también incorporan dicha arquitectura.
Si estás interesado en aprender más sobre ARM, este tutorial está dividido en dos partes: Introduction to ARM y Efficient C for ARM.
El índice de la primera parte: Introduction to ARM, es el siguiente:
Vídeos y diapositivas de CONFidence 2104
- August 13, 2014
- tuxotron
- 50 Shades of RED: Stories from the “Playroom” - Video
- NSA for dummies …methods to break RSA - Video
- Scaling Security - Video
- ATMs – We kick their ass - Video - Slides
- Bitcoin Forensics: Fact or Fiction? - Video - Slides
- Shameful secrets of proprietary protocols - Video - Slides
- Evaluation of Transactional Controls in e-Banking Systems - Video - Slides
- All your SAP P@$$w0ЯdZ belong to us - Video - Slides
- Protecting Big Data at Scale - Video - Slides
- Security Implications of the Cross-Origin Resource Sharing - Video - Slides
- Asymmetric Defense “Using your home-field advantage” - Video - Slides
- Preventing violation of memory safety in C/C++ software - Video - Slides
- On the battlefield with the Dragons – the interesting and surprising CTF challenges - Video - Slides
- SCADA deep inside: protocols and security mechanisms - Video - Slides
- Exploring treasures of 77FEh - Video - Slides
- The Tale of 100 CVE’s - Video - Slides
- Hacking the Czech Parliament via SMS - Video

A continuación os dejo la lista de los vídeos (algunos con su correspondiente presentación) la conferencia sobre seguridad informática CONFidence 2014. Ésta se celebro los días 27 y 28 de mayo.
El material publicado es el siguiente:
Audio de las charlas de la HOPE X
- August 12, 2014
- tuxotron
- A Conversation with Edward Snowden - 16kbps - 128kbps
- Keynote Address Daniel Ellsberg - 16kbps - 128kbps
- The Hacker Wars A Conversation with NSA Whistleblower Thomas Drake - 16kbpsThe Hacker Wars - 128kbps
- #radBIOS: Yelling a Database across the Room - 16kbps - 128kbps
- (Geo)location, Location, Location: Technology and Countermeasures for Mobile Location Surveillance - 16kbps - 128kbps
- A Beautiful Mosaic: How to Use FOIA to Fight Secrecy, Explore History, and Strengthen American Democracy - 16kbps - 128kbps
- A Sea of Parts - 16kbps - 128kbps
- A Story of Self Publishing Success - 16kbps - 128kbps
- Apophenia: Hunting for the Ghost in the Machine - 16kbps - 128kbps
- Are You Ready to SIP the Kool-Aid? - 16kbps - 128kbps
- Art under Mass Surveillance - 16kbps - 128kbps
- Ask the EFF This Year on the Internet - 16kbps - 128kbps
- Barrett Brown and Anonymous: Persecution of Information Activists - 16kbps - 128kbps
- Biohacking and DIYbiology North of the 45th Parallel - 16kbps - 128kbps
- Bless the Cops and Keep Them Far from Us: Researching, Exploring, and Publishing Findings While Staying out of Legal Trouble - 16kbps - 128kbps
- Blinding The Surveillance State - 16kbps - 128kbps
- Bootkits: Step-by-Step - 16kbps - 128kbps
- Bringing Down the Biological System: How Poisons Hack the Body - 16kbps - 128kbps
- Building an Open Source Cellular Network at Burning Man - 16kbps - 128kbps
- Can You Patent Software? - 16kbps - 128kbps
- Closing Ceremonies - 16kbps - 128kbps
- Codesigning Countersurveillance - 16kbps - 128kbps
- Community Infrastructure for FOSS Projects - 16kbps - 128kbps
- Community Owned and Operated Cellular Networks in Rural Mexico - 16kbps - 128kbps
- Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs - 16kbps - 128kbps
- Cultures of Open Source: A Cross-Cultural Analysis - 16kbps - 128kbps
- Cyber Security in Humanitarian Projects as a Social Justice Issue - 16kbps - 128kbps
- Dark Mail - 16kbps - 128kbps
- Disruptive Wearable Technology - 16kbps - 128kbps
- DIY Usability Research: A Crash Course in Guerrilla Data Gathering - 16kbps - 128kbps
- Drop It Like Its Hot: Secure Sharing and Radical OpSec for Investigative Journalists - 16kbps - 128kbps
- Echoes of Returns Lost: The History of The Telecom Digest - 16kbps - 128kbps
- Electric Waste Orchestra: Learning and Teaching Music, Electronics, Programming, and Repurposing - 16kbps - 128kbps
- Elevator Hacking: From the Pit to the Penthouse - 16kbps - 128kbps
- Ergonomic Human Interface Hacking - 16kbps - 128kbps
- Ethical Questions and Best Practices for Service Providers in the Post-Snowden Era - 16kbps - 128kbps
- Fuckhackerfucks! An Audience Bashing - 16kbps - 128kbps
- G-code: The Programming Language of Machining and 3D Printers - 16kbps - 128kbps
- Hacking Money, from Alexander the Great to Zerocoin - 16kbps - 128kbps
- Hacking the Patent System: The Vulnerabilities That Allow for Bad Patents and How to Stop Them - 16kbps - 128kbps
- Hearses and Hand-Held Calculators: The Unlikely Connections That Shaped Modern Technology and Tech Culture - 16kbps - 128kbps
- How to Prevent Security Afterthought Syndrome - 16kbps - 128kbps
- HTTP Must Die - 16kbps - 128kbps
- I Am The Cavalry: Lessons Learned Fuzzing the Chain of Influence - 16kbps - 128kbps
- Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices - 16kbps - 128kbps
- Jumping the Carbon-Silicon Boundary for Fun and (Mostly) Profit - 16kbps - 128kbps
- Keeping Old Code Alive: The Venerable LambdaMOO Server in 2014 - 16kbps - 128kbps
- Lessons Learned from Implementing Real Life Whistleblowing Platforms - 16kbps - 128kbps
- Lockpicking, a Primer - 16kbps - 128kbps
- Media, Popular Misconceptions, and the CSI Effect What Does It Mean for InfoSec and Tech Policy? - 16kbps - 128kbps
- Movie: Algorithm - 16kbps - 128kbps
- Movie: Die Gstettensaga: The Rise of Echsenfriedl - 16kbps - 128kbps
- Movie: The Internets Own Boy: The Story of Aaron Swartz - 16kbps - 128kbps
- Movie: War on Whistleblowers: Free Press and the National Security State - 16kbps - 128kbps
- North Korea Using Social Engineering and Concealed Electronic Devices to Gather Information in the Worlds Most Restrictive Nation - 16kbps - 128kbps
- Obfuscation and its Discontents: DIY Privacy from Card Swap to Browser Hack - 16kbps - 128kbps
- Per Speculum In Ænigmate - 16kbps - 128kbps
- Postprivacy: A New Approach to Thinking about Life in the Digital Sphere - 16kbps - 128kbps
- PRISM-Proof Email: Why Email Is Insecure and How We Are Fixing It - 16kbps - 128kbps
- Privacy-Friendly Hypertext? Do Not Track, Privacy Badger, and the Advertising-Funded Web - 16kbps - 128kbps
- Project PM: Crowdsourcing Research of the Cyber-Intelligence Complex - 16kbps - 128kbps
- Reverse Engineering Unlocking the Locks - 16kbps - 128kbps
- Rickrolling Your Neighbors with Google Chromecast - 16kbps - 128kbps
- Screening: Nowhere to Hide (working title: Rambam Gets His Man) - 16kbps - 128kbps
- SecureDrop: A WikiLeaks in Every Newsroom - 16kbps - 128kbps
- Securing a Home Router - 16kbps - 128kbps
- Shortwave Pirate Radio and Oddities of the Spectrum - 16kbps - 128kbps
- Showing Keys in Public What Could Possibly Go Wrong? - 16kbps - 128kbps
- Skeuomorphic Steganography - 16kbps - 128kbps
- Social Engineering - 16kbps - 128kbps
- Solve the Hard Problem - 16kbps - 128kbps
- Spy Improv: Ask Me Anything - 16kbps - 128kbps
- SSL++: Tales of Transport-Layer Security at Twitter - 16kbps - 128kbps
- Steepest Dissent: Small Scale Digital Fabrication - 16kbps - 128kbps
- Stupid Whitehat Tricks - 16kbps - 128kbps
- Surveillance, Sousveillance, and Anti-Surveillance: Artistic Responses to Watching - 16kbps - 128kbps
- Teaching Electronic Privacy and Civil Liberties to Government - 16kbps - 128kbps
- Technology and Jamming of XKEYSCORE - 16kbps - 128kbps
- The Hidden World of Game Hacking - 16kbps - 128kbps
- The Internet Society Speaks The History, Futures, and Alternate Directions of the Internet and Its Governance - 16kbps - 128kbps
- The Many Faces of LockSport - 16kbps - 128kbps
- The Repair Movement - 16kbps - 128kbps
- The Science of Surveillance - 16kbps - 128kbps
- The Sex Geek as Culture Hacker - 16kbps - 128kbps
- The Web Strikes Back Fighting Mass Surveillance with Open Standards - 16kbps - 128kbps
- This Is the X You Are Looking For - 16kbps - 128kbps
- Threat Modeling and Security Test Planning - 16kbps - 128kbps
- Thwarting the Peasants: A Guided and Rambunctious Tour Through the 2600 DeCSS Legal Files - 16kbps - 128kbps
- Travel Hacking with The Telecom Informer - 16kbps - 128kbps
- Unmasking a CIA Criminal - 16kbps - 128kbps
- Updates from the Online Identity Battlefield - 16kbps - 128kbps
- Usable Crypto: New Progress in Web Cryptography - 16kbps - 128kbps
- Using Travel Routers to Hide in Safety - 16kbps - 128kbps
- Vigilante Justice: Masks, Guns, and Networks - 16kbps - 128kbps
- Visualization for Hackers: Why Its Tricky, and Where to Start - 16kbps - 128kbps
- When Confidentiality and Privacy Conflict - 16kbps - 128kbps
- When Whistleblowers Are Branded as Spies: Edward Snowden, Surveillance, and Espionage - 16kbps - 128kbps
- When You Are the Adversary - 16kbps - 128kbps
- Why the Future is Open Wireless - 16kbps - 128kbps
- Will It Blend? How Evil Software Clogs the Pipes - 16kbps - 128kbps
- Wireless Meshnets: Building the Next Version of the Web - 16kbps - 128kbps
- Youve Lost Privacy, Now Theyre Taking Anonymity (aka Whistleblowing is Dead Get Over It) - 16kbps - 128kbps
- Your Right to Whisper: LEAP Encryption Access Project - 16kbps - 128kbps

Los organizadores de la HOPE X han puesto disponible el audio de todas las charlas que se dieron lugar. Si quieres los vídeos, puedes comprarlos online.
HOPE X se dio lugar en Nueva York los pasados 18-20 de julio.
Aquí como de costumbre os dejamos las lista con todas las charlas:
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec