From Slides to Silicon in 3 years!

From Slides to Silicon in 3 years! - Hallo sahabat idera security, Pada Artikel yang anda baca kali ini dengan judul From Slides to Silicon in 3 years!, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan Artikel fighting for a better world, Artikel general, yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.

Judul : From Slides to Silicon in 3 years!
link : From Slides to Silicon in 3 years!

Baca juga


From Slides to Silicon in 3 years!


Remember our Xen 0wning Trilogy at Black Hat in summer 2008, specifically the presentation on Detecting & Preventing the Xen Hypervisor Subversions?

One of the things we were discussing there was a proposal to include an additional restriction to Intel processors that would disallow execution of usermode pages from within supervisor mode (ring0). Such a feature, we argued, apart from obviously making many ring3-to-ring0 exploits much harder, including the very Xen heap overflow exploit we presented in the slides, would also bring us closer to efficient runtime code integrity checkers for kernels and hypervisors, as discussed in the slides.


Slide #97, Detecting and Preventing Xen Hypervisor Subversions, Black Hat USA, July, 2008

Fast forward 3 years. On June 1st, 2011, an Intel engineer is submitting a patch for Xen to support a mysterious new processor feature called SMEP (Supervisor Mode Execution Protection). He writes the feature is not yet documented in SDM, but soon will be. In fact, the May 2011 update of Intel SDM already contains the details:

Intel SDM, vol. 3a, May 2011, source: intel.com

Some other people spotted this feature earlier, because of another patch submitted by another Intel engineer to Linux kernel a few weeks ago. Here's a good write up by Dan Rosenberg discussing how this patch makes writing Linux kernel exploits harder, and how it's still possible to write them.

The SMEP feature still doesn't seem to be present in the processors available on the market, including the latest Sand Bridge processors, but there's no question it's coming, now that the feature made it into SDM.

It is quite rewarding to see your idea implemented in a processor... I guess this is how physicists feel when they introduce a new particle as part of a new quantum model, and later discover evidences to support the existence of this very particle in the wild...


Demikianlah Artikel From Slides to Silicon in 3 years!

Sekianlah artikel From Slides to Silicon in 3 years! kali ini, mudah-mudahan bisa memberi manfaat untuk anda semua. baiklah, sampai jumpa di postingan artikel lainnya.

Anda sekarang membaca artikel From Slides to Silicon in 3 years! dengan alamat link https://iderasecurity.blogspot.com/2011/06/from-slides-to-silicon-in-3-years.html

0 Response to "From Slides to Silicon in 3 years!"

Post a Comment