Bibliography (91):

  1. turing-complete#security-implications

    [Transclude the forward-link's context]

  2. Networks All the Way Down

  3. Welcome to the Jungle: Or, A Heterogeneous Supercomputer in Every Pocket

  4. Warehouse-Scale Video Acceleration (Argos): Co-design and Deployment in the Wild

  5. Stack

  6. https://news.ycombinator.com/item?id=19348141

  7. Security, Moore’s law, and the anomaly of cheap complexity

  8. The Wheel of Reincarnation

  9. Core I9-7900X

  10. Platform Embedded Security Technology Revealed [Slides]

  11. Platform Embedded Security Technology Revealed [Book]

  12. Project Zero: Trust Issues: Exploiting TrustZone TEEs

  13. Titan in Depth: Security in Plaintext

  14. Google Working To Remove MINIX-Based ME From Intel Platforms

  15. Nonlinear Computation in Deep Linear Networks

  16. Adversarial Reprogramming of Neural Networks

  17. Adversarial Reprogramming of Text Classification Neural Networks

  18. gpt-3#prompt-programming

    [Transclude the forward-link's context]

  19. Inductive Biases for Deep Learning of Higher-Level Cognition

  20. Pretrained Transformers as Universal Computation Engines

  21. Machine Teaching for Bayesian Learners in the Exponential Family

  22. Machine Teaching: an Inverse Problem to Machine Learning and an Approach Toward Optimal Education

  23. Dataset Distillation

  24. "Less Than One"-Shot Learning: Learning n Classes From M < N Samples

  25. Layered Security for Your Next SoC

  26. https://x.com/_markel___/status/982364102449393668

  27. Apple’s T2 Security Chip Has an Unfixable Flaw: Checkm8 Vulnerability Used to Jailbreak IPhones Hits Macs As Well.

  28. https://x.com/qwertyoruiopz/status/1238606353645666308

  29. Always-On Processor Magic: How Find My Works While IPhone Is Powered Off

  30. Hey Siri: An On-Device DNN-Powered Voice Trigger for Apple’s Personal Assistant

  31. Hardware Backdoors in Some X86 CPUs

  32. https://www.alchemistowl.org/arrigo/Papers/Arrigo-Triulzi-PACSEC08-Project-Maux-II.pdf

  33. https://www.alchemistowl.org/arrigo/Papers/Arrigo-Triulzi-CANSEC10-Project-Maux-III.pdf

  34. Cellphone Guts for the Curious ...

  35. Malware-Flingers Can Pwn Your Mobile With Over-The-Air Updates; German Fed-Sponsored Boffins: They Have Ways of Hearing You Talk

  36. Hard Disk Hacking—Intro

  37. Macbook Charger Teardown: The Surprising Complexity inside Apple's Power Adapter

  38. MSP430F2003: 16-Bit Ultra-Low-Power Microcontroller, 1kB Flash, 128B RAM, 16-Bit Sigma-Delta A/D, USI for SPI/I2C

  39. On Hacking MicroSD Cards

  40. Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 2)

  41. On the Design of Display Processors

  42. https://news.ycombinator.com/item?id=18413757

  43. https://habr.com/en/articles/429602/

  44. Open Source Firmware

  45. Your Computer Is a Distributed System

  46. Putting out the hardware dumpster fire

  47. Warehouse-Scale Computers to Exploit Request-Level and Data-Level Parallelism

  48. https://danluu.com/deconstruct-files/

  49. Wikipedia Bibliography:

    1. D-Wave Systems  :

    2. InfiniBand

    3. Experience curve effects

    4. Digital signal processor

    5. Application-specific integrated circuit

    6. Firmware  :

    7. ARM Cortex-M § Cortex-M3  :

    8. Finite-state machine

    9. Commodore 64  :

    10. Commodore 1541  :

    11. MOS Technology 6502  :

    12. Power Macintosh 5200 LC  :

    13. Intel Management Engine

    14. Software Guard Extensions

    15. AMD Platform Security Processor  :

    16. Protection ring  :

    17. System Management Mode  :

    18. Intel Management Engine § Ring −3 rootkit  :

    19. Minix  :

    20. Floating-point unit

    21. FRACTRAN

    22. Memory management unit

    23. Advanced Video Coding

    24. Apple A9  :

    25. System on a chip  :

    26. ARC (processor)  :

    27. MCS-51  :

    28. JTAG  :

    29. MacBook Pro § Fourth generation (Touch Bar)  :

    30. WatchOS  :

    31. Apple silicon § Apple T1  :

    32. Baseband processor  :

    33. SIM card

    34. Smart card  :

    35. Java Card  :

    36. Near-field communication  :

    37. Disk encryption  :

    38. Wear leveling  :

    39. Direct memory access  :

    40. Wake-on-LAN  :

    41. Network booting  :

    42. TI MSP430  :

    43. Input–output memory management unit