Introduction All modern CPU vendors have a history of design and implementation defects, ranging from relatively benign stability issues to potential security vulnerabilities. The latest CPU errata release for second generation Intel Core processors describes a total of 120 "erratums", or hardware bugs. Although most of these errata bugs are listed as "No Fix", Intel has supported the ability to apply stability and security updates to the CPU in the form of microcode updates for well over a decade*. Unfortunately, the microcode update format is undocumented. Researchers are currently prevented from gaining any sort of detailed understanding of the microcode format, which means that it is impossible to study the updates to clearly establish whether any security issues are being fixed by microcode patches. The following document is a summary of notes I gathered while investigating the Intel microcode update mechanism. * The earliest Intel microcode release appears to be from January 29, 2000. Since that date, a further 29 distinct microcode DAT files have been released.
2021-12-02 09:52:02 402KB MicroCode
1
信息安全_数据安全_us-18-Guilfanov-Decompiler-Internals-Microcode 应急响应 应急响应 web安全 安全建设 业务安全
2021-08-22 21:00:06 1.01MB APT 安全建设 安全 信息安全
Intel CPU 微码大全(截至2014-09-30),为文本格式。
2021-04-25 19:58:35 1.86MB Intel CPU Microcode 微码
1