ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

36C3 - Uncover, Understand, Own - Regaining Control Over Your AMD CPU

Автор: media.ccc.de

Загружено: 2019-12-28

Просмотров: 21904

Описание: https://media.ccc.de/v/36c3-10942-unc...



The AMD Platform Security Processor (PSP) is a dedicated ARM CPU inside your AMD processor and runs undocumented, proprietary firmware provided by AMD.

It is a processor inside your processor that you don't control. It is essential for system startup. In fact, in runs before the main processor is even started and is responsible for bootstrapping all other components.

This talk presents our efforts investigating the PSP internals and functionality and how you can better understand it.

Our talk is divided into three parts:

The first part covers the firmware structure of the PSP and how we analyzed this proprietary firmware. We will demonstrate how to extract and replace individual firmware components of the PSP and how to observe the PSP during boot.

The second part covers the functionality of the PSP and how it interacts with other components of the x86 CPU like the DRAM controller or System Management Unit (SMU). We will present our method to gain access to the, otherwise hidden, debug output.

The talk concludes with a security analysis of the PSP firmware.
We will demonstrate how to provide custom firmare to run on the PSP and introduce our toolchain that helps building custom applications for the PSP.

This talk documents the PSP firmware's proprietary filesystem and provides insights into reverse-engineering such a deeply embedded system. It further sheds light on how we might regain trust in AMD CPUs despite the delicate nature of the PSP.


Robert Buhren Alexander Eichner Christian Werling

https://fahrplan.events.ccc.de/congre...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
36C3 -  Uncover, Understand, Own - Regaining Control Over Your AMD CPU

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

36C3 -  Intel Management Engine deep dive

36C3 - Intel Management Engine deep dive

Dissecting the AMD Platform Security Processor

Dissecting the AMD Platform Security Processor

36C3 -  The Ultimate Acorn Archimedes talk

36C3 - The Ultimate Acorn Archimedes talk

36C3 -  Open Source is Insufficient to Solve Trust Problems in Hardware

36C3 - Open Source is Insufficient to Solve Trust Problems in Hardware

All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate...

All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate...

IWP9 2023

IWP9 2023

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

КОРИЧНЕВАЯ НОТА - МОЖНО ЛИ ОБДЕЛАТЬСЯ ОТ ЗВУКА?

КОРИЧНЕВАЯ НОТА - МОЖНО ЛИ ОБДЕЛАТЬСЯ ОТ ЗВУКА?

34C3 -  Everything you want to know about x86 microcode, but might have been afraid to ask

34C3 - Everything you want to know about x86 microcode, but might have been afraid to ask

36C3 -  A systematic evaluation of OpenBSD's mitigations

36C3 - A systematic evaluation of OpenBSD's mitigations

Так из чего же состоят электроны? Самые последние данные

Так из чего же состоят электроны? Самые последние данные

36C3 -  TrustZone-M(eh): Breaking ARMv8-M's security

36C3 - TrustZone-M(eh): Breaking ARMv8-M's security

🤫ЗАМЕНА microUSB НА USB-C КЛЕЕМ ДЛЯ ПАЙКИ НОВЫЙ ПОДХОД К УСТАНОВКЕ КОМПОНЕНТОВ О КОТОРОМ МОЛЧАТ🤐

🤫ЗАМЕНА microUSB НА USB-C КЛЕЕМ ДЛЯ ПАЙКИ НОВЫЙ ПОДХОД К УСТАНОВКЕ КОМПОНЕНТОВ О КОТОРОМ МОЛЧАТ🤐

Нас держат за идиотов? 10 МЛН человек поверили в этот бред!

Нас держат за идиотов? 10 МЛН человек поверили в этот бред!

Economist explains what happens after AI takes all jobs

Economist explains what happens after AI takes all jobs

34C3 -  Intel ME: Myths and reality

34C3 - Intel ME: Myths and reality

GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs

GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs

36C3 -  SIM card technology from A-Z

36C3 - SIM card technology from A-Z

Building an LED SUPERNOVA!

Building an LED SUPERNOVA!

DIY: Disabling Intel ME 'Backdoor' on your Computer

DIY: Disabling Intel ME 'Backdoor' on your Computer

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]