GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs

Black Hat USA 2018

Presented by: Christopher Domas
Date: Thursday August 09, 2018
Time: 11:00 - 11:50
Location: South Pacific F

Complexity is increasing. Trust eroding. In the wake of Spectre and Meltdown, when it seems that things cannot get any darker for processor security, the last light goes out. This talk will demonstrate what everyone has long feared but never proven: there are hardware backdoors in some x86 processors, and they're buried deeper than we ever imagined possible. While this research specifically examines a third-party processor, we use this as a stepping stone to explore the feasibility of more widespread hardware backdoors.

Christopher Domas

Christopher Domas "@xoreaxeaxeax" is a cyber security researcher and embedded systems engineer, currently investigating low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor. His more relevant work includes the binary visualization tool ..cantor.dust.. and the memory sinkhole x86 privilege escalation exploit.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats