The microcode of the Zen 2 to Zen 4 processors has been hacked by
security people from Google:
https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking
Apart from breaking getting updates past AMD's signature
verificiation process, they also created a toolbox for
playing around with the microcode. There is also quite
some information on the internal microcode format at https://github.com/google/security-research/blob/master/pocs/cpus/entrysign/zentool/
mitchalsup@aol.com (MitchAlsup1) writes:
I was an architect at AMD when we put microcode patching in the chips.
We did understand that the encryption and keys were not sufficiently
strong at that instant in time, and there were other driving factors.
But, I am surprised that it took this long to break (~22 years).
I have heard at least one talk (IIRC at 34C3, 35C3, or 36C3) about
patching microcode for some then-older AMD processors (IIRC Phenoms).
They could not do it for then-current AMD CPUs because of the
encryption, so maybe AMD improved the encryption between your time and Zen2-Zen4. But obviously not enough.
While it's interesting if you can play around with the microcode of
your hardware, the perspective that an attacker might subvert your
hardware at the microcode level is worrying.
I was an architect at AMD when we put microcode patching in the chips.
We did understand that the encryption and keys were not sufficiently
strong at that instant in time, and there were other driving factors.
But, I am surprised that it took this long to break (~22 years).
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 17:59:32 |
Calls: | 10,389 |
Files: | 14,061 |
Messages: | 6,416,956 |