USENIX Security '17 - Reverse Engineering x86 Processor Microcode

  Рет қаралды 6,930

USENIX

USENIX

Күн бұрын

Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, and Thorsten Holz, Ruhr-University Bochum
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patched in-place without requiring any special hardware. While it is well-known that CPUs are regularly updated with this mechanism, very little is known about its inner workings given that microcode and the update mechanism are proprietary and have not been throughly analyzed yet.
In this paper, we reverse engineer the microcode semantics and inner workings of its update mechanism of conventional COTS CPUs on the example of AMD’s K8 and K10 microarchitectures. Furthermore, we demonstrate how to develop custom microcode updates. We describe the microcode semantics and additionally present a set of microprograms that demonstrate the possibilities offered by this technology. To this end, our microprograms range from CPU-assisted instrumentation to microcoded Trojans that can even be reached from within a web browser and enable remote code execution and cryptographic implementation attacks.
View the full program: www.usenix.org...

Пікірлер: 7
@eclipsegst9419
@eclipsegst9419 4 жыл бұрын
Some day soon, we will be able to easily hack the microcode of all the locked intel processors and be able to overclock all of them :) That will be an amazing day. 20 core Xeons that cost 100 bucks @ 5Ghz? yes please!
@genkidama7385
@genkidama7385 4 жыл бұрын
one dislike from intel. hhhhhhhhh
@jeffreycliff922
@jeffreycliff922 Жыл бұрын
Please consider putting the code for this online somewhere other than NSA/Microsoft Github! Or, alternatively, giving permission via some kind of free software license for the world to use the version you had in 2018 back before NSA/Microsoft bought Github!
@neilbradley
@neilbradley 6 жыл бұрын
"x86 CPUs are prone to errors". All CPUs are prone to errors.
@Sparkette
@Sparkette 5 жыл бұрын
So is KZbin apparently-the auto-generated captions are in German even though he's speaking English.
@st1cky953
@st1cky953 4 жыл бұрын
Is it possible to remove Melt/Spec Patch from the Microcode that 9700k (906ED) uses? I heard it is Hardware Patched what is it mean? Is there anyway to bypass it or deactivate it anyway?
Breaking the x86 Instruction Set
44:29
Black Hat
Рет қаралды 360 М.
ПРИКОЛЫ НАД БРАТОМ #shorts
00:23
Паша Осадчий
Рет қаралды 6 МЛН
From Small To Giant Pop Corn #katebrush #funny #shorts
00:17
Kate Brush
Рет қаралды 69 МЛН
iPhone or Chocolate??
00:16
Hungry FAM
Рет қаралды 37 МЛН
GIANT Gummy Worm Pt.6 #shorts
00:46
Mr DegrEE
Рет қаралды 86 МЛН
Explaining RISC-V: An x86 & ARM Alternative
14:24
ExplainingComputers
Рет қаралды 454 М.
Reverse Engineering the Motorola MC14500 1-bit CPU
21:57
Usagi Electric
Рет қаралды 17 М.
Intro to Hardware Reversing: Finding a UART and getting a shell
12:07
Tony Gambacorta
Рет қаралды 894 М.
Introduction to Firmware Reversing
11:32
Tony Gambacorta
Рет қаралды 307 М.
x86 Internals for Fun & Profit • Matt Godbolt • GOTO 2014
54:01
GOTO Conferences
Рет қаралды 32 М.
Reading Silicon: How to Reverse Engineer Integrated Circuits
31:52
The Rise of Unix. The Seeds of its Fall.
16:51
Asianometry
Рет қаралды 492 М.
35C3 -  Inside the AMD Microcode ROM
37:21
media.ccc.de
Рет қаралды 7 М.
ПРИКОЛЫ НАД БРАТОМ #shorts
00:23
Паша Осадчий
Рет қаралды 6 МЛН