Related papers by Arrigo Triulzi @cynicalsecurity posted to Twitter today in response to this thread: Project Maux Mk.II (2008) [1]http://t.co/h1gDtV4Vlr The Jedi Packet Trick takes over the Deathstar (2010) [2]http://t.co/ENlITkJEoX Project Booshoo or the Emporer's Modified Mind (2011) [3]https://t.co/33trlpJkFG ----- At 03:36 AM 2/13/2014, Bill Stewart wrote: At 06:42 PM 2/12/2014, Peter Gutmann wrote: >[4] http://www.livehacking.com/tag/network-card-backdoor/ > >Proof of concept was been proven in 2010. Practical application is probably >being done by now. Somebody is asleep behind the wheel if it is not. It was demonstrated well before then, Arrigo Triulzi had demonstrated running an SSH server inside a NIC several years earlier. Back in the mid-80s I ran a secure computer center (with a huge VAX 11/780 :-) and the Army/DoD/NIST rules for secure computers needed to know who wrote the channel programs that the computer was using. Channels were a mainframe thing, which predated the VAX; the closest equivalent we had was a KMC11 processor that sat in the Unibus and handled interrupts and cooked-mode input for the serial cards. So yes, proofs of concept have been around for a while :-) References 1. http://t.co/h1gDtV4Vlr 2. http://t.co/ENlITkJEoX 3. https://t.co/33trlpJkFG 4. http://www.livehacking.com/tag/network-card-backdoor/