Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Reverse-Engineering DisplayLink devices

URL
http://mirror.fem-net.de/CCC/26C3/mp4/26c3-3353-de-reverse-engineering_displaylink_devices.mp4
File name
26c3-3353-de-reverse-engineering_displaylink_devices.mp4
File size
416.6 MB
MD5
f98c68d2e8ce91b6ed6abc42917da129
SHA1
47742050f46be9b2064249e8eab4915cd52062d8

DisplayLink produces nice, useful USB graphics adapters. Unfortunately, they had no real Linux support. In this talk, we'll describe how we first reverse-engineered the encryption and basic protocol, prompting DisplayLink to actually release a Linux driver on their own. However, their driver still doesn't support compression. In the second part, we'll therefore describe how we reverse-engineered the compression algorithm.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !