Sujet : Re: Google hacks Zen 2 to 4 microcode
De : anton (at) *nospam* mips.complang.tuwien.ac.at (Anton Ertl)
Groupes : comp.archDate : 19. Apr 2025, 07:10:06
Autres entêtes
Organisation : Institut fuer Computersprachen, Technische Universitaet Wien
Message-ID : <2025Apr19.081006@mips.complang.tuwien.ac.at>
References : 1 2
User-Agent : xrn 10.11
mitchalsup@aol.com (MitchAlsup1) writes:
I was an architect at AMD when we put microcode patching in the chips.
We did understand that the encryption and keys were not sufficiently
strong at that instant in time, and there were other driving factors.
>
But, I am surprised that it took this long to break (~22 years).
I have heard at least one talk (IIRC at 34C3, 35C3, or 36C3) about
patching microcode for some then-older AMD processors (IIRC Phenoms).
They could not do it for then-current AMD CPUs because of the
encryption, so maybe AMD improved the encryption between your time and
Zen2-Zen4. But obviously not enough.
While it's interesting if you can play around with the microcode of
your hardware, the perspective that an attacker might subvert your
hardware at the microcode level is worrying.
- anton
-- 'Anyone trying for "industrial quality" ISA should avoid undefined behavior.' Mitch Alsup, <c17fcd89-f024-40e7-a594-88a85ac10d20o@googlegroups.com>