Intel x86 Microcode

May 19, 2020 23:38

"Finally, the casket is opened: we (+@h0t_max and @_Dmit) have extracted Intel x86 microcode! One more Intel "top secret" information gets revealed..." ©

"Using the Local Direct Access Test (LDAT) DFT feature of Intel Atom CPU, we dumped Microcode Sequencer ROM. Also, we extracted what we think is IROM (Immediates for uops) and even managed to modify MS Patch RAM and Match/Patch registers"

"Here are all five Microcode Sequncer's arrays for Atom Goldmont core named according to our guesses (https://github.com/chip-red-pill/glm-ucode). We'll publish the scripts lately..."

"That's all the consequences of the CSME hack by SA-00086"

"We will describe the process how we accessed LDAT more deeply soon"

https://github.com/chip-red-pill/glm-ucode

intel

Previous post Next post
Up