Breaking the x86 Instruction Set

Black Hat USA 2017

Presented by: Christopher Domas
Date: Thursday July 27, 2017
Time: 17:00 - 18:00
Location: Mandalay Bay EF

A processor is not a trusted black box for running code; on the contrary, modern x86 chips are packed full of secret instructions and hardware bugs. In this talk, we'll demonstrate how page fault analysis and some creative processor fuzzing can be used to exhaustively search the x86 instruction set and uncover the secrets buried in your chipset. We'll disclose new x86 hardware glitches, previously unknown machine instructions, ubiquitous software bugs, and flaws in enterprise hypervisors. Best of all, we'll release our sandsifter toolset, so that you can audit - and break - your own processor.

Christopher Domas

Christopher Domas is a cyber security researcher and embedded systems engineer, currently investigating low level processor exploitation.  He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.  His more relevant work includes the binary visualization tool ..cantor.dust.. and the memory sinkhole x86 privilege escalation exploit.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats