Qgelm

Project:Rosenbrdige – ‘Hardware Backdoors in x86 CPUs’

Originalartikel

Backup

<html> <p><a href=„https://github.com/xoreaxeaxeax/rosenbridge“><img src=„https://cdn-blog.adafruit.com/uploads/2018/08/rosenbridge.gif“ alt=„“ class=„img-responsive“/></a></p> <p>In this 50-minute presentation (video below) from <a href=„https://www.blackhat.com/us-18/briefings/schedule/#god-mode-unlocked---hardware-backdoors-in-x86-cpus-10194“ rel=„noopener“ target=„_blank“>black hat USA 2018</a>, Christopher Domas discusses hardware backdoors in &#8220;some&#8221; x86 processors &#128558; with special attention given to <a href=„https://en.wikipedia.org/wiki/VIA_C3“ rel=„noopener“ target=„_blank“>VIA C3 CPUs</a>.</p> <p>Thankfully he&#8217;s open-sourced all his research, including his <a href=„https://i.blackhat.com/us-18/Thu-August-9/us-18-Domas-God-Mode-Unlocked-Hardware-Backdoors-In-x86-CPUs.pdf“ rel=„noopener“ target=„_blank“>presentation slides</a>, <a href=„https://i.blackhat.com/us-18/Thu-August-9/us-18-Domas-God-Mode-Unlocked-Hardware-Backdoors-In-x86-CPUs-wp.pdf“ rel=„noopener“ target=„_blank“>white paper</a> discussing the topic, and crucially a <a href=„https://github.com/xoreaxeaxeax/rosenbridge“ rel=„noopener“ target=„_blank“>GitHub repo of the tools</a> used to test his theories.</p> <p>From the white paper,</p> <blockquote> <p><em>Abstract&#8212;As the complexity of x86 processors grows unbounded, the realities of the hidden and unexpected behaviors of these chips become apparent. While micro-architectural vulnerabilities such as speculative execution side channels are unsettling, more powerful, unknown capabilities remain buried deeper still. Here, we finally demonstrate what everyone has long feared but never proven: there are hardware backdoors in some x86 processors, and they&#8217;re buried deeper than we ever imagined possible.</em></p> </blockquote> <p><img src=„https://cdn-blog.adafruit.com/uploads/2018/08/x86.png“ alt=„“ class=„img-responsive“ srcset=„https://cdn-blog.adafruit.com/uploads/2018/08/x86.png 1371w, https://cdn-blog.adafruit.com/uploads/2018/08/x86-150x114.png 150w, https://cdn-blog.adafruit.com/uploads/2018/08/x86-300x228.png 300w, https://cdn-blog.adafruit.com/uploads/2018/08/x86-768x585.png 768w, https://cdn-blog.adafruit.com/uploads/2018/08/x86-600x457.png 600w, https://cdn-blog.adafruit.com/uploads/2018/08/x86-574x437.png 574w“ sizes=„(max-width: 1371px) 100vw, 1371px“/></p> <p><img src=„https://cdn-blog.adafruit.com/uploads/2018/08/msr.png“ alt=„“ class=„img-responsive“ srcset=„https://cdn-blog.adafruit.com/uploads/2018/08/msr.png 1488w, https://cdn-blog.adafruit.com/uploads/2018/08/msr-150x100.png 150w, https://cdn-blog.adafruit.com/uploads/2018/08/msr-300x201.png 300w, https://cdn-blog.adafruit.com/uploads/2018/08/msr-768x514.png 768w, https://cdn-blog.adafruit.com/uploads/2018/08/msr-600x401.png 600w, https://cdn-blog.adafruit.com/uploads/2018/08/msr-654x437.png 654w“ sizes=„(max-width: 1488px) 100vw, 1488px“/></p> <p><em><strong>Watch:</strong></em></p> <p><iframe width=„500“ height=„281“ src=„https://www.youtube.com/embed/_eSAF_qT_FY?feature=oembed“ frameborder=„0“ allow=„autoplay; encrypted-media“ allowfullscreen=„allowfullscreen“>[embedded content]</iframe></p> <div class=„ctx-subscribe-container ctx-personalization-container ctx_default_placement ctx-clearfix“/> <div class=„ctx-social-container ctx_default_placement ctx-clearfix“/> <div class=„ctx-module-container ctx_default_placement ctx-clearfix“/> </html>

Cookies helfen bei der Bereitstellung von Inhalten. Diese Website verwendet Cookies. Mit der Nutzung der Website erklären Sie sich damit einverstanden, dass Cookies auf Ihrem Computer gespeichert werden. Außerdem bestätigen Sie, dass Sie unsere Datenschutzerklärung gelesen und verstanden haben. Wenn Sie nicht einverstanden sind, verlassen Sie die Website.Weitere Information