How The RIDL CPU Vulnerability Was Found

preview_player
Показать описание
In this video we explore the basic ideas behind CPU vulnerabilities and have a closer look at RIDL.

Chapters:
00:00 - Intro & Motivation
00:57 - Concept #1: CPU Caches
01:57 - Measure Cache Access Time with rdtscp
05:00 - Concept #2: Out-of-order Execution
06:11 - CPU Pipelining
07:13 - Out-of-order Execution Example
09:19 - CPU Caching + Out-of-order Execution = Attack Idea!!
10:33 - Negative Result: Reading Kernel Memory From User Mode
13:45 - Pandoras Box
14:23 - Interview with Sebastian Österlund
17:24 - Accidental RIDL Discovery
19:31 - NULL Pointer Bug
21:50 - Investigating Root Cause
23:28 - Conclusion
24:24 - Outro

-=[ ❤️ Support ]=-

-=[ 🐕 Social ]=-

Рекомендации по теме
Комментарии
Автор

I love how a negative result was so pivotal.

hikingpete
Автор

I discovered this channel 5 years ago, thanks to the reverse engineering playlist. I took CS in Uni 3 years ago, inspired by this channel. Some months ago i started writing my thesis on the formalization of relaxed memory models and their speculative behaviour, and today this video is uploaded. What a journey, Live :)

nicholas
Автор

Your comment about the page size isn't quite correct: A modern x86 CPU fetches and writes 64 byte chunks of memory (the cache line size). The 4096 byte page size refers to the minimum chunk of memory that can be virtually addressed, i.e. mapped from virtual to physical memory. So basically, as you're watching replace "page" with "cache line" in most of this video. Page size only becomes relevant later when it comes to memory access controls.

squelchedotter
Автор

While I might be a bit biased, I really have to say that this video turned out extremely nice! Great job explaining this in a very easy to follow way!

sirmcx
Автор

I really respect Intel for not only taking silicon vulnerabilities so seriously, not only starting a bug bounty program, but sponsoring people to promote it by analyzing existing bugs. This is dedication, and I really hope we see more companies treat security in this way. I've seen more and more companies start bug bounty programs recently, and it's definitely a move in the right direction.

ndm
Автор

4:12 I don't know if anybody has said this yet, there are only 243 comments right now, but:
What you pronounced as "fourty-two'th" should be "fourty-second"
.
In general: good job. Your work is appreciated.

wrathofainz
Автор

I never had someone explain branch prediction so well to me. Thank lord.

peglothefirst
Автор

You actually show out-of-order-execution (<illegal instruction>; <instruction with cache side effect>) vulnerabilities, like meltdown. Speculative execution (foo: xor rax, rax; jnz bar; jmp foo; bar: <unreachable, but speculative executed code with cache side effect>) vulnerabilities like spectre are slightly different concepts. The first class is afaik intel-only, the second class is an issue for other modern CPUs of other ISAs too.

RepublikSivizien
Автор

In my view, every field should have journals of negative results. I had no idea that the history of the speculative execution vulnerabilities was so rich.

logiciananimal
Автор

If anyone else wants more videos like this to watch, Christopher Domas' Defcon talks on x86 architecture are extremely fascinating.

dandymcgee
Автор

I did not understand much of the video but still find it intresting

AjayKumar-fdmv
Автор

I always wanna understand that issue and you just explained it briliantly! I salute you, man!

miroslavmajer
Автор

42 TOOTH lmao. These things just make my day. Thank you!

mikaay
Автор

This is one of the best video's you've posted. Well done!

llmnrxpsed
Автор

What a great timing of that upload hence I just read about them but didnt know how you would discover something like this

kampet
Автор

I made my Bachelor's thesis about RIDL, it was awesome! 😍 I basically used it to leak the hash of the root password of my Professor 's PC remotely through ssh. Cool video, thank you !

francescoventurini
Автор

"The forty-twoth page" really gets me.

Forty-second.

sarunint
Автор

Amazing video! I hope we get more content on hardware-type vulnerabilities and “hacking”!

ibonitog
Автор

Holy smokes, i was waiting on this one ! Big Thanks.

MADhatter_AIM
Автор

shoutout to intel for sponsoring this, lol!
amazing video as always

xNaN
visit shbcf.ru