Full metadata
Title
Security Analysis of x86 Processor Microcode
Description
Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise a processor by implementing new malicious instructions or altering the functionality of existing instructions, including processor-accelerated virtualization or cryptographic primitives. Not only is this attack vector capable of subverting all software-enforced security policies and access controls, but it also leaves behind no postmortem forensic evidence since the write-only patch memory is cleared upon system reset. Although supervisor privileges (ring zero) are required to update processor microcode, this attack cannot be easily mitigated due to the implementation of microcode update functionality within processor silicon. In this paper, we reveal the microarchitecture and mechanism of microcode updates, present a security analysis of this attack vector, and provide some mitigation suggestions.
Date Created
2014-05
Contributors
- Chen, Daming Dominic (Author)
- Ahn, Gail-Joon (Thesis director)
- Lee, Joohyung (Committee member)
- Barrett, The Honors College (Contributor)
- Computer Science and Engineering Program (Contributor)
- School of International Letters and Cultures (Contributor)
- School of Mathematical and Statistical Sciences (Contributor)
Topical Subject
Resource Type
Extent
21 pages
Language
eng
Copyright Statement
In Copyright
Primary Member of
Series
Academic Year 2013-2014
Handle
https://hdl.handle.net/2286/R.I.22342
Level of coding
minimal
Cataloging Standards
System Created
- 2017-10-30 02:50:57
System Modified
- 2021-08-11 04:09:57
- 3 years 2 months ago
Additional Formats