Presentation Title: Remote Code Execution Through Intel CPU Bugs
According to the Intel Specification Updates, Intel Core 2 has 128 confirmed bugs. Intel Itanium (designed for critical systems) looks more 「promising」, carrying over 230 bugs. They have all been confirmed by Intel and described in errata section of their specification updates. Some bugs 「just」 crash the system (under quite rare conditions) while the others give the attackers full control over the machine. In other words, Intel CPUs have exploitable bugs which are vulnerable to both local and remote attacks which works against any OS regardless of the patches applied or the applications which are running.
Although CPU bugs are not something new in the security industry, nobody has come out with any proof-of-concept exploits and as it stands, there are no known malware that take advantage of these bugs, although some malware writers have actually used CPU bugs for targeted attacks. It is just a matter of time before we start seeing these sort of attacks used in more devastating ways over the Internet. Intel has provided workarounds to major BIOS vendors for some of these bugs, but who knows which vendor actually uses them? End-users are in the dark as to how to check if they are secure or not. Intel doesn't provide any test program for this and the worst thing is - some bugs are still not fixed. In other words, Intel has no workaround for it.
Kris Kaspersky has over 15 years of software engineering and reverse engineering experience in CD/DVD protections, PE/ELF packers/protectors, CD/DVD copiers, audio/video codecs (MPEG 1/MPEG 2/MPEG 4), data flow optimization, CPU-specific optimization, compiler specific optimization, debugging code and much more. As an independent consultant and technical writer, Kris has been an active researcher in the field of reverse engineering and pretty much dedicated his daily life in mastering the art. He possesses a deep knowledge in OS internals and low level ASM. He is also the author for Xakep magazine and has published more than 20 books about system programming. The titles of his English publications are below:
* Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming (ISBN: 1931769222);
* Hacker Disassembling Uncovered: Second Edition, totally rewritten (ISBN-10: 1931769648);
* CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (ISBN-10: 1931769338);
* Data Recovery: Tips and Solutions: Windows, Linux, and BSD (ISBN-10: 1931769567);
* Code Optimization: Effective Memory Usage (ISBN-10: 1931769249);
* Shellcoder's Programming Uncovered (ISBN-10: 193176946X);
* Hacker Debugging Uncovered (ISBN-10: 1931769400)