10 votes

GOD MODE UNLOCKED - Hardware Backdoors in x86

4 comments

  1. [2]
    RapidEyeMovement
    Link
    Interesting both the social media and the github links discussed in this talk seem to be abandoned https://twitter.com/xoreaxeaxeax https://github.com/xoreaxeaxeax Also interesting, the NightShyft...

    Interesting both the social media and the github links discussed in this talk seem to be abandoned

    https://twitter.com/xoreaxeaxeax
    https://github.com/xoreaxeaxeax

    Also interesting, the NightShyft program he wrote to visualize side channel attacks on Model Specific Register (MSR) as been removed from his github. This is the application he points out at the end of the talk that he would like to go into further details about and has some interesting applications. TimeStamp Link

    Wonder what this guy is up to lately

    .... and he is a Senior Security Researcher at Intel Corporation

    Now I know what you are thinking, I am sure that is all just coincidence.

    9 votes
    1. Elronnd
      Link Parent
      Looks like he made a commit to the movfuscator just a couple of months ago? I wouldn't call that abandoned, just low-activity.

      Looks like he made a commit to the movfuscator just a couple of months ago? I wouldn't call that abandoned, just low-activity.

      3 votes
  2. [2]
    tindall
    Link
    With the correct URL this time.

    With the correct URL this time.

    2 votes
    1. RapidEyeMovement
      Link Parent
      Not to mitigate this at all, but u need ring 0 access to set the God Mode bit, correct? For those who didn't watch, this researcher has found some processors with the God Mode bit enabled by default.

      Not to mitigate this at all, but u need ring 0 access to set the God Mode bit, correct?

      For those who didn't watch, this researcher has found some processors with the God Mode bit enabled by default.

      5 votes