GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
Video Statistics and Information
Channel: Black Hat
Views: 261,903
Rating: 4.902452 out of 5
Keywords: Black Hat, Black Hat USA, Black Hat USA 2018, BHUSA, Black Hat 2018, BlackHat, Black Hat Briefings
Id: _eSAF_qT_FY
Channel Id: undefined
Length: 50min 59sec (3059 seconds)
Published: Tue Aug 28 2018
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.
This guy again. Every time I see his face I know I'm in for a ride.
I loved the lecture and hearing about all the work that went into this hack. But the short version, should anyone not care to watch the whole thing, is that on certain VIA C3 x86 CPUs there is an actual, shit-you-not undocumented instruction that enables an undocumented execution core which in turn gives you complete access to the system from user space, including read/write access to ring 0.
On some CPUs he tested the attack requires you to first set a particular MSR bit, which can only happen in ring 0 anyway, but on others he found that this bit was already set.
Either way, it's absolutely insane that this is a thing, but at least this particular vulnerability doesn't seem to apply to Intel or AMD processors. Still, the fact that a major company like VIA would build a backdoor directly into their processors should make you wonder about Intel and AMD too (if you didn't already), and black boxes in general.
I'll just leave this here.
Black hat wearing dark wizard
You'd think an event this big could afford to record audio properly.
Hey I used to work in the same office as this guy!
I was participating in a CTF and he was there. I got to watch him RE some stuff.
Dude is insane. The code he was REing was obfuscated to wits end. He solved the challenge in about 10 hours.
So I got a question. How do these security researchers earn a living? His company is here, apparently they do security/hacking for IoT devices. They say they serve the Fortune 50 and the U.S. intelligence community but I'm just trying to figure out what exactly they would sell these companies and spies? Also, is that what all the security researchers do?
I think the most interesting parts of this were all the tools he developed for blackbox testing hardware. It seems like you could use these tools to look for undocumented instructions on any processor. Particularly impressive to work out the ISA to the extent of building an assembler for it, all completely blackbox.
The audio quality hurts my delicate ears
Ah, that topic again. Move on, nothing to see here.
This is a about a specific cpu VIA C3 (ancient) and the behaviour described is in fact in the manual so no backdoor whatsoever.
Here is the datasheet, check page 82. http://datasheets.chipdb.org/VIA/Nehemiah/VIA%20C3%20Nehemiah%20Datasheet%20R113.pdf