Bogdan Deac
  • Home
  • Poetry
  • About
Sign in Subscribe

security

A collection of 3 posts
Hands-on: Exploit RISC-V CPU using Return-Oriented Programming
security

Hands-on: Exploit RISC-V CPU using Return-Oriented Programming

In a previous article, I’ve described a step-by-step Return-Oriented Programming (ROP) attack on RISC-V CPU architecture from a theoretical point of view. In this one, I will present a practical attack on a RISC-V CPU deployed on an FPGA. At the end of this article, you will know: * how
01 Feb 2023 15 min read
Return oriented programming on RISC-V - Part 1
security

Return oriented programming on RISC-V - Part 1

There is a wide spread tendency nowadays to offload computation tasks from CPU to hardware dedicated units that offer better performance in terms of execution time and performance/watt, compared to generic processors. This approach involves the design of new hardware components, in silicon, that outperform the CPUs in tasks
17 Feb 2022 11 min read
How to generate strong passwords using music theory
security Featured

How to generate strong passwords using music theory

I am passionate about music and, in one night, I came up with an idea about how to generate strong passwords that are relatively easy to remember using music theory. In this article I am going to explain the foundations of this method, but firstly, a little background about passwords.
04 Nov 2021 5 min read
Page 1 of 1
Bogdan Deac © 2025
Powered by Ghost