
R0 CREW
@r0_crew
A community of low-level information security researchers.
ID: 161401871
https://forum.reverse4you.org 30-06-2010 19:17:39
3,3K Tweet
5,5K Followers
289 Following

Today we're[+Mark Ermolov and Dmitry Sklyarov]disclosing the technique allowing to modify #Intel #Microcode on the fly! For the first time you have the ability to intercept control flow at such a low level. We've developed the microcode patch that changes the processor model string as PoC



Wow, we (+Maxim Goryachy and Dmitry Sklyarov) have found two undocumented x86 instructions in Intel CPUs which completely control microarchitectural state (yes, they can modify microcode)



[1/4]People ask us (+Dmitry Sklyarov and Mark Ermolov) for details about undocumented crbus instructions. We recorded the demo showing that for access to crbus requires only execute arbitrary code with root/admin privilege. (details below)









The ELF-file inside microcode update, Intel Atom uCode format and etc. Details in slides from our ZeroNights 2021 talk "Chip Red Pill: How we achieved to execute arbitrary [micro]code inside Intel Atom CPUs". github.com/chip-red-pill/…
![Maxim Goryachy (@h0t_max) on Twitter photo The ELF-file inside microcode update, Intel Atom uCode format and etc. Details in slides from our <a href="/ZeroNights/">ZeroNights</a> 2021 talk "Chip Red Pill: How we achieved to execute arbitrary [micro]code inside Intel Atom CPUs". github.com/chip-red-pill/… The ELF-file inside microcode update, Intel Atom uCode format and etc. Details in slides from our <a href="/ZeroNights/">ZeroNights</a> 2021 talk "Chip Red Pill: How we achieved to execute arbitrary [micro]code inside Intel Atom CPUs". github.com/chip-red-pill/…](https://pbs.twimg.com/media/E-NIatqXEAUOHrY.jpg)

Our congratulations to the winners of Hex-Rays Plugin Contest 2021!🎉🎁🎆 🥇 Tenet by 🥈 D-810 by Boris Batteux, eShard 🥉 nmips by Leonardo Galli With many excellent entries selecting just three was a real challenge. Take a look yourself: hex-rays.com/contests_detai…




