A tool for deciphering the Intel processor microcodes has appeared on Guthub
- Jul 23
Cybersecurity experts have published a tool capable of unpacking and deciphering the microcode of low -power Intel processors. Thus, you can see how the manufacturer implemented various protective measures.
The tool received the name Intel Microcode Decryptor, currently it is already available on GitHub. In essence, Tulas consists of three scripts on Python, which can be used to decode a microcode.
Intel Microcode Decryptor was created by eminent experts: Maxim Goryachy, Mark Ermolov and Dmitry Sklyarov. Earlier, these experts found a number of vulnerabilities in Intel processors. According to them, using the development, you can “split” the code of some CPU of ATOM, Pentium and Celeron models based on Intel Goldmont and Goldmont Plus microarchitectures.
Just in case, the researchers warned that their tools cannot be used to create a custom update of the microcode, since there is a special RSA-signature to verify authenticity.
Dmitry Goryachy, who reported the release of Intel Microcode Decryptor on Twitter, noted that the development will help to understand how Intel reduced the risks of spectre, for example.
Other experts will also be able to analyze how the manufacturer has implemented a number of technologies like Intel Trusted Execution Technology (TXT), Intel Software Guard Extensions (SGX) and Intel Virtualization Technology (VT-X).
#cybersecurity