- Samsung Galaxy Z Fold5 - toldozás-foldozás
- Apple Watch Sport - ez is csak egy okosóra
- A legnagyobb számok a Honor kagylójában vannak
- Telekom mobilszolgáltatások
- Xiaomi 13T és 13T Pro - nincs tétlenkedés
- Samsung Galaxy Z Fold7 - ezt vártuk, de…
- One mobilszolgáltatások
- Samsung Galaxy S23 Ultra - non plus ultra
- Ezek az új Google Pixel cuccok hivatalos magyar árai
- iPhone topik
Új hozzászólás Aktív témák
-
S_x96x_S
addikt
Ha valakit mélyebben érdekel az AMD microcode annak érdemes elmélyedni a friss CCC - előadásban.
( az előadás még a régebbi AMD procikkal foglalkozik - de hamarosan itt lehet a saját ZEN-es főzött microcode korszak - lehetőségekkel és veszélyekkel )Inside the AMD Microcode ROM
(Ab)Using AMD Microcode for fun and security"Microcode runs in most modern CPUs and translates the outer instruction set (e.g. x86) into a simpler form (usually a RISC architecture). It is updatable to fix bugs in the silicon (see Meltdown/Spectre), but these updates are encrypted and signed, so no one knows how microcode works on conventional CPUs. We successfully reverse engineered part of the microde semantics of AMD CPUs and are able to write our own programs. We also recovered the mapping between the physical readout (electron microscope) and the "virtual" addresses used by microcode itself. In this talk we present background on microcode, our findings, our open source framework to write custom microcode and our custom defensive measures implemented in microcode.
We build on our results presented on 34C3 to provide more insight into how microcode works and more details of the microcode ROM itself.
tl;dr diff to last talk:
- Mapped physical readout to virtual addresses, we can now read the microcode implementation of specfic instructions
- More microcode semantics known, more stable programs
- Opensource framework for creating, diassembling and testing microcode on AMD CPUs
- Simple hardware setup to develop microcode programs
- More practical examples of what you can do with microcode, focused on defense instead of offense this timeSince 34C3 we worked on recovering the microcode ROM completely and used that knowledge to implement constructive microcode programs that add to or enhance functionality of the CPU. We also worked on our now open source framework to create and diassemble microcode for AMD CPUs up to 2013. We will give a short intro into how to use it to create custom microcode programs and test them on real hardware. We also provide guidelines on how to construct the test setup we used, which is essentially any old AMD mainboard (native serial port required), a RaspberryPi with a serial adapter and some wiring including a few basic electronic components. Using this you can remotely and automatically test any number of microcode updates and it is integrated in our framework.
On the microcode program side we will show how to hijack microcoded instructions to replace them with new semantics, for example reviving the good-old BOUND x86 instruction. We also show how to roll your own microcode update verification scheme, so only trusted and signed updates can be loaded on vulnerable CPUs.
Additionally we will provide some implementation details found in the microcode ROM and show how it is used to implement complex functions like the instruction WRMSR, which among other functions is used to update the microcode.
We will start with a crash-course covering fundamentals related to instruction decoding, CPU architecture and microcode principles. We will then present our new insights and finish with a demo of how our framework works.
"https://media.ccc.de/v/35c3-9614-inside_the_amd_microcode_rom
Új hozzászólás Aktív témák
- Hardcore café
- Milyen asztali (teljes vagy fél-) gépet vegyek?
- Elemlámpa, zseblámpa
- Samsung Galaxy Z Fold5 - toldozás-foldozás
- PROHARDVER! feedback: bugok, problémák, ötletek
- Dobta az OLED kijelzőt a Honor MagicPad 3
- Autós topik
- Hisense LCD és LED TV-k
- Leállítás, Alvó mód és Újraindítás: mit csinál a Windows?
- S.T.A.L.K.E.R. 2: Heart of Chornobyl
- További aktív témák...
- Razer Viper Mini
- EK-Quantum Velocity RGB - Full Nickel - LGA1700-hoz is!
- Újszerű Creality K1 MAX + CFS garanciális, nyomtatótér: 300 x 300 x 300 mm 160 óra üzemidő
- Extrém teljesítményű gamer PC (AMD Ryzen 7 5700X, Radeon RX 7900 XTX) LEGJOBB ÁR/ÉRTÉK ARÁNY!
- Garanciális Gamer Számítógép, PC (RTX 3060Ti, I5-10400, 16GB Ram, SSD) Beszámítás! Posta ok! (37)
- ÁRGARANCIA!Épített KomPhone i5 14400F 32/64GB RAM RX 9060 XT 16GB GAMER PC termékbeszámítással
- Honor X6a 128GB, Kártyafüggetlen, 1 Év Garanciával
- Dell 16 Inspiron 5625 FHD+ IPS Ryzen5 5625U 4.3Ghz 16GB 512GB SSD Radeon RX Vega7 Win11 Garancia
- Asus 14 Zenbook UX425E FHD IPS i7-1165G7 4.7Ghz 16GB 512GB SSD Intel Iris XE Graphics Win11 Garancia
- Sound Blaster AE-7 (B-Stock)
Állásajánlatok
Cég: FOTC
Város: Budapest