ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Автор: Black Hat

Загружено: 2026-02-25

Просмотров: 644

Описание: Catastrophic hardware failures. From an aging I/O device to cosmic ray bit flips, memory degradation to CPU fires. When an unrecoverable hardware error is detected, the common platform response is to generate a Machine Check Exception, and shut down before the problem gets worse.

In this talk, we'll see what happens when we circumvent all the traditional fail safes. What happens when, instead of exceptionally rare failures from natural causes, we deliberately create these fatal events from software. When instead of a platform shutdown, we force the system to limp along, damaged but alive. We'll show how carefully injecting these signals during privileged CPU operations can disrupt secure transitions, how those disruptions progress to cascading system failures, and how to ride the chaos to gain hardware privilege escalation. Finally, we'll see how to undo the damage, recover from the unrecoverable, and let the system continue as if nothing happened - now with a foothold in privileged space, all through hardware failure events synthesized through software-only attacks.

We'll conclude by showing how to use this previously unknown vector against [redacted], to reveal another [redacted] hardware vulnerability, and walk through a brave new world of machine check research opportunities - for both attackers and defenders - across technologies and architectures.

By:
Christopher Domas | Independent Security Researcher, Dazzle Cat Duo

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

The Internet Was Weeks Away From Disaster and No One Knew

The Internet Was Weeks Away From Disaster and No One Knew

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

NVIDIA didn't want me to do this

NVIDIA didn't want me to do this

Власти РФ против телеграма. Чего ждать?

Власти РФ против телеграма. Чего ждать?

Black Hat USA 2025 | The First 30 Months of Psychological Manipulation of Humans by AI

Black Hat USA 2025 | The First 30 Months of Psychological Manipulation of Humans by AI

Как защитить API: Уязвимости и решения

Как защитить API: Уязвимости и решения

Black Hat USA 2025 Keynote | Chronicles of Counter-Intelligence from the Citizen Lab

Black Hat USA 2025 Keynote | Chronicles of Counter-Intelligence from the Citizen Lab

Why switch to Linux when you can use DOS?

Why switch to Linux when you can use DOS?

The Internet, Reinvented.

The Internet, Reinvented.

Black Hat USA 2025 | A Fireside Chat with Cognitive Scientist and AI Expert Gary Marcus

Black Hat USA 2025 | A Fireside Chat with Cognitive Scientist and AI Expert Gary Marcus

Программирование на ассемблере без операционной системы

Программирование на ассемблере без операционной системы

Private AI Framework Cluster… FIXED

Private AI Framework Cluster… FIXED

39C3 - Asahi Linux - Porting Linux to Apple Silicon

39C3 - Asahi Linux - Porting Linux to Apple Silicon

Elite:

Elite: "The game that couldn't be written"

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

OSINT для начинающих: узнайте всё о ком угодно!

OSINT для начинающих: узнайте всё о ком угодно!

Black Hat USA 2025 | Exploiting DNS for Stealthy User Tracking

Black Hat USA 2025 | Exploiting DNS for Stealthy User Tracking

When open-sourcing your code goes wrong...

When open-sourcing your code goes wrong...

Insane Shadow Data Trick in C

Insane Shadow Data Trick in C

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]