All of these talks about compromising CPU security are super interesting! My favorite was the one about the hidden instructions on the x86 architecture.
obfuscating the addresses could be an idea. The idea is that each process is handed a random key, that key is used access the "pool of registers" instead of a bank or line. basically using encryption, the hard part would be to deal with different processes depending on each others register use... you'd need a way to hand identical key to different processes when required, without allowing malicious processes to get that key (thus removing the obfuscation). It's just an idea I had just now, but it seems that if you could make address access "random" each time, yet seemingly static for the processes, it would remove a lot of cache/memory attacks. Basically a big black box of registers... it could be utterly retarded though, if so please point it out to me before I invest too much brain power on this :P
Anyone who has a Smart Phone is either oblivious or cares nothing about their privacy. Value Privacy? Want a Smartphone? Then live inside a Faraday Cage and never use it to make phone calls. (Because you won't be able too). Post Script Anyone who has a CELL PHONE cares nothing about their Privacy, "smart" or "not".
Or maybe there literally may not be any privacy at all...because there is something beyond electronics or humans..."metaphysical level of beings compromise all physical security at once"
Boring, too much explanation of things that are abstract and can be easily explained verbally in states where the attack vector happens and where it fails. Its the result that matters, the fact you did it is praise enough, however, ARM is a licence system and has many implementations, so does it work on other devices?
@@RobinObinray I am not so sure of that, having watched a youtube video about ARM development by one of the guys who developed ARM. According to what he said, ARM is an architecture but not all ARM implementations are the same, they did tailor a fair number of applications to client needs, so really, the question is what sort of devices are vulnerable.
@@thepvporg imho, most manufacturers don't even bother changing too much of someone else's work. It's called overstandardization, and it's robotic, it's how our society is most likely going to be in the future...
All of these talks about compromising CPU security are super interesting! My favorite was the one about the hidden instructions on the x86 architecture.
Yeah, Chris Domas did a good job.
only some people seeing this. wow
no more comments indicates that not everyone has this level of understanding thats y this is called black hats.
maybe intelligent people don't prefer shouting out like "yeahhh!!! i got it!"
obfuscating the addresses could be an idea.
The idea is that each process is handed a random key, that key is used access the "pool of registers" instead of a bank or line.
basically using encryption, the hard part would be to deal with different processes depending on each others register use...
you'd need a way to hand identical key to different processes when required, without allowing malicious processes to get that key (thus removing the obfuscation).
It's just an idea I had just now, but it seems that if you could make address access "random" each time, yet seemingly static for the processes, it would remove a lot of cache/memory attacks.
Basically a big black box of registers... it could be utterly retarded though, if so please point it out to me before I invest too much brain power on this :P
Anyone who has a Smart Phone is either oblivious or cares nothing about their privacy. Value Privacy? Want a Smartphone? Then live inside a Faraday Cage and never use it to make phone calls. (Because you won't be able too).
Post Script
Anyone who has a CELL PHONE cares nothing about their Privacy, "smart" or "not".
Or maybe there literally may not be any privacy at all...because there is something beyond electronics or humans..."metaphysical level of beings compromise all physical security at once"
Boring, too much explanation of things that are abstract and can be easily explained verbally in states where the attack vector happens and where it fails. Its the result that matters, the fact you did it is praise enough, however, ARM is a licence system and has many implementations, so does it work on other devices?
Probably yes, because most of licensed vendors don't even modify the lowest level of the architecture!
@@RobinObinray I am not so sure of that, having watched a youtube video about ARM development by one of the guys who developed ARM.
According to what he said, ARM is an architecture but not all ARM implementations are the same, they did tailor a fair number of applications to client needs, so really, the question is what sort of devices are vulnerable.
@@thepvporg imho, most manufacturers don't even bother changing too much of someone else's work. It's called overstandardization, and it's robotic, it's how our society is most likely going to be in the future...
sir I need your help