R0 CREW
@r0_crew
A community of low-level information security researchers.
ID: 161401871
https://forum.reverse4you.org 30-06-2010 19:17:39
4,4K Tweet
5,5K Followers
291 Following
Today we're[+Mark Ermolov and Dmitry Sklyarov]disclosing the technique allowing to modify #Intel #Microcode on the fly! For the first time you have the ability to intercept control flow at such a low level. We've developed the microcode patch that changes the processor model string as PoC
Wow, we (+Maxim Goryachy and Dmitry Sklyarov) have found two undocumented x86 instructions in Intel CPUs which completely control microarchitectural state (yes, they can modify microcode)
[1/4]People ask us (+Dmitry Sklyarov and Mark Ermolov) for details about undocumented crbus instructions. We recorded the demo showing that for access to crbus requires only execute arbitrary code with root/admin privilege. (details below)
Hey man, you want some money? Join awesome #CTF by the #CyberUnit company and my friend Yegor Aushev, which will go online as a part of the @GISECDUBAI conference. Don't lose the opportunity to defeat #blueteam and make some money! Join on: thehunt.cyberunit.ae
The ELF-file inside microcode update, Intel Atom uCode format and etc. Details in slides from our ZeroNights 2021 talk "Chip Red Pill: How we achieved to execute arbitrary [micro]code inside Intel Atom CPUs". github.com/chip-red-pill/…
Our congratulations to the winners of Hex-Rays Plugin Contest 2021!🎉🎁🎆 🥇 Tenet by 🥈 D-810 by Boris Batteux, eShard 🥉 nmips by Leonardo Galli With many excellent entries selecting just three was a real challenge. Take a look yourself: hex-rays.com/contests_detai…