DEF CON 25 - Christopher Domas - Breaking the x86 Instruction Set

  Рет қаралды 18,675

DEFCONConference

DEFCONConference

Күн бұрын

A processor is not a trusted black box for running code; on the contrary, modern x86 chips are packed full of secret instructions and hardware bugs. In this talk, we'll demonstrate how page fault analysis and some creative processor fuzzing can be used to exhaustively search the x86 instruction set and uncover the secrets buried in your chipset. We'll disclose new x86 hardware glitches, previously unknown machine instructions, ubiquitous software bugs, and flaws in enterprise hypervisors. Best of all, we'll release our sandsifter toolset, so that you can audit - and break - your own processor.

Пікірлер: 22
@lightarmanov6266
@lightarmanov6266 6 жыл бұрын
This is the coolist thing I've seen in a long time
@devjock
@devjock 6 жыл бұрын
I had a feeling Christopher already knew what we know now..
@derek5863
@derek5863 6 жыл бұрын
Agree, this is gold. I think there are many other angles from this presentation that we haven't even started to investigate.
@derek5863
@derek5863 6 жыл бұрын
The 'Halt and Catch Fire' instruction would be great if it triggered a processor destruction charge i.e. hardware anti-tampering method supporting FIPS 140-2 or one time use secure message device - James Bond style.
@jonharson
@jonharson 5 жыл бұрын
Its all fun and game until you find out that CPU controlling a nuclear power plant emergency controls.
@saeedradmehr1976
@saeedradmehr1976 5 жыл бұрын
Really good and simple too, I'm inclined to think this hadn't been done before because of legal obstacles rather than being hard to do. But any how it was really really nice to see this talk.
@5n0Wg00n5
@5n0Wg00n5 6 жыл бұрын
Brilliant..
@RandallStephens397
@RandallStephens397 6 жыл бұрын
This is terrifying.
@SupGhostly
@SupGhostly 5 жыл бұрын
Why is it terrifying?
@TheGoodChap
@TheGoodChap Жыл бұрын
@@SupGhostly do you know about the NSA? Snowden?
@SupGhostly
@SupGhostly Жыл бұрын
@@TheGoodChap I do not. pretty new to security world, but would love to read more if you point me to a good article please
@Awcator
@Awcator 9 ай бұрын
That was hell lot of knowledge transfer
@xdman2956
@xdman2956 11 ай бұрын
29:30 is the highlight for me
@anteconfig5391
@anteconfig5391 5 жыл бұрын
I feel like it's dumb for me to ask but aren't the "rings" (0,1,2,3 ), SMM and other security modes designated by the operating system, so I'm thinking that if you wrote a small OS you wouldn't have those privileged modes of execution if you didn't program them in. So my question is am I right to think this or am I just wrong?
@SpookySkeleton738
@SpookySkeleton738 5 жыл бұрын
The rings, hypervisor and SMM are all hardware features built into the CPU and chipset. What belongs in Rings 0 and 3 are designated by the kernel, everything below is firmware-level.
@TheGoodChap
@TheGoodChap Жыл бұрын
They're a part of the cpu hardware, smm and other low level operations and modes can only be accessed by special instructions in the instruction set that can't be used for anything else. Technically your computer boots from bios thinking it's a tiny cpu from the 1970s and you have to set all kinds of special registers and things during boot up to make it realize it's a modern fully featured cpu.
@73h73373r357
@73h73373r357 6 жыл бұрын
Wait, didn't he violate responsible disclosure by telling us that the HaCF instruction exists, right after laying out the methods he used to find it?
@nullplan01
@nullplan01 5 жыл бұрын
In theory yes. In practice you now have to find manufacturer (he was using smaller manufacturers like TransMeta and VIA, remember), and then the specific chip he found the instruction on. Happy hunting!
@dorukayhanwastaken
@dorukayhanwastaken 4 жыл бұрын
This is Intel we're talking about. Anything less than immediate full disclosure might as well be no disclosure.
@kimotroph9683
@kimotroph9683 2 жыл бұрын
Haha. Yeah right. That's why its DEFCON.
@cn9630
@cn9630 Жыл бұрын
A CONCERN: "A VIA x86 Chip was found to have a tiny processor within it. It had it's own operating system (Minix) and bypassed ALL security at the hardware level. It's called the ARC Processor & you can bet it was developed in Israel for worldwide distribution."
@cn9630
@cn9630 Жыл бұрын
Timestamp 50:03 on KZfaq vid: "179. James O'Keefe & The Deep State, Ukraine, Mike Gill & The..." On Brendon Lee O'Connell channel.
Hot Ball ASMR #asmr #asmrsounds #satisfying #relaxing #satisfyingvideo
00:19
Oddly Satisfying
Рет қаралды 22 МЛН
Backstage 🤫 tutorial #elsarca #tiktok
00:13
Elsa Arca
Рет қаралды 7 МЛН
WHY IS A CAR MORE EXPENSIVE THAN A GIRL?
00:37
Levsob
Рет қаралды 18 МЛН
Breaking the x86 Instruction Set
44:29
Black Hat
Рет қаралды 356 М.
Chris Domas: The 1s and 0s behind cyber warfare
16:45
TED
Рет қаралды 159 М.
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robots
27:25
DEFCONConference
Рет қаралды 53 М.
DEF CON 25 - David Robinson -  Using GPS Spoofing to control time
35:23
DEFCONConference
Рет қаралды 12 М.
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
51:00
Black Hat
Рет қаралды 307 М.
reductio ad absurdum by Christopher Domas
39:56
Shakacon LLC
Рет қаралды 26 М.
Iphone or nokia
0:15
rishton vines😇
Рет қаралды 990 М.
Задача APPLE сделать iPHONE НЕРЕМОНТОПРИГОДНЫМ
0:57
Will the battery emit smoke if it rotates rapidly?
0:11
Meaningful Cartoons 183
Рет қаралды 4,5 МЛН
iPhone 15 Unboxing Paper diy
0:57
Cute Fay
Рет қаралды 1,7 МЛН
ПК с Авито за 3000р
0:58
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 1,9 МЛН
С Какой Высоты Разобьётся NOKIA3310 ?!😳
0:43