Mark Ermolov

1.6K posts

Mark Ermolov banner
Mark Ermolov

Mark Ermolov

@_markel___

I research security of Intel platforms. I don't work for Intel

Москва, Россия Katılım Eylül 2014
131 Takip Edilen11.7K Takipçiler
Mark Ermolov
Mark Ermolov@_markel___·
Using this vulnerability for the rdpmc instruction, we were able to read the SGX SVN Key - the first derived key from the Root Provisioning Key and Global Wrapping Key for Gemini Lake platform that's stored at 0x2205 and 0x2206 of the internal control registers
Mark Ermolov tweet mediaMark Ermolov tweet mediaMark Ermolov tweet media
English
0
2
27
961
Mark Ermolov
Mark Ermolov@_markel___·
I'm amazed at Intel's ability to downplay the severity of published vulnerabilities. They described CVE-2018-3640 (Rogue System Register Read) as simply an ASLR bypass, but this vulnerability in fact allows the CPU internal CRBUS to be read (at least for Goldmont/Plus uarch)
Mark Ermolov tweet media
English
1
12
68
6.2K
Mark Ermolov
Mark Ermolov@_markel___·
The reason why Intel will continue to dominate on the server market is that server power efficiency is not determined by compute efficiency, but rather by the balance between idle power consumption and wake-up speed, which is something Intel excels at...
English
9
10
117
13.3K
Mark Ermolov
Mark Ermolov@_markel___·
It confirms our previous assumptions (speculative micro-instruction execution), introduces a whole new class of spectre attacks (uspectre) and shows that a number of recent TE vulnerabilities (such as Rogue System Register Read) actually originate in the microcode...
English
1
3
25
1.9K
Mark Ermolov
Mark Ermolov@_markel___·
Hardware glitching masters have taken on Intel's microarchitecture - very, very cool! I'm so glad our work is contributing to research that was previously unimaginable. Research into hardware attacks on Intel processors has enormous potential... download.vusec.net/papers/microsp…
English
1
36
167
23.2K
Mark Ermolov
Mark Ermolov@_markel___·
In the screen below, after shutting down L2 via PCU (reducing its voltage to 0), the L2 Machine Check bank (CR 0x385) immediately shows an error, but C6SRAM (Staging Buffer in our paper for udbgrd/wr) is still working...
Mark Ermolov tweet media
English
0
0
5
742
Mark Ermolov
Mark Ermolov@_markel___·
Finally, I was able to reliably answer the question of whether C6SRAM (holds CPU core context in C6 power state) is connected in any way to L2: no, it is an independent SRAM
English
1
1
10
1K
Mark Ermolov
Mark Ermolov@_markel___·
There's nothing more interesting than reverse engineering undocumented (partially documented) Intel firmware commands...
Mark Ermolov tweet mediaMark Ermolov tweet media
English
0
13
176
9.7K
Mark Ermolov
Mark Ermolov@_markel___·
Now, all the secrets of the hardware initialization/power management for CPU IPs can be studied. How many interesting things await us ahead...
English
0
0
6
870
Mark Ermolov
Mark Ermolov@_markel___·
However, using its internal ROM patching mechanism allowing controlling execution of each ROM instruction and post-execution analysis of output register context we reconstructed all the PCU 96kb ROM!
Mark Ermolov tweet media
English
2
2
15
1.2K
Mark Ermolov
Mark Ermolov@_markel___·
Intel p-unit microcontroller (Foxton) has Harvard architecture (independent addr spaces for code and data) and only a part of its firmware's (pcode) ROM is accessible for load instructions.
English
2
0
14
1.3K
Mark Ermolov retweetledi
Alexander Popov
Alexander Popov@a13xp0p0v·
My new article: "Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"⚡️ I tell a bug collision story and introduce my pet project kernel-hack-drill, which helped me to exploit the hard bug that received @PwnieAwards 2025 a13xp0p0v.github.io/2025/09/02/ker…
Alexander Popov tweet mediaAlexander Popov tweet media
English
4
85
260
34K
Mark Ermolov retweetledi
Nikolaj Schlej
Nikolaj Schlej@NikolajSchlej·
The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot and FW updater signature bypass in almost any Insyde H2O-based UEFI firmware used since 2012 and still in use today. English writeup: coderush.me/hydroph0bia-pa…
English
2
92
197
19.9K
Mark Ermolov retweetledi
Alexander Popov
Alexander Popov@a13xp0p0v·
Looks like this @Timesys Corporation did an amazing job [SARCASM] selling their Timesys Kernel Hardening Analysis Tool that simply provides the recommendations from my open source project kernel-hardening-checker. They don't even mention kernel-hardening-checker. Shame on them👎
Alexander Popov tweet media
English
1
5
47
4.8K
Mark Ermolov
Mark Ermolov@_markel___·
BCLK – Base Clock, 100 MHz clock from PCH to CPU in desktops FCLK - system agent's clock in desktop CPUs ICLK - clock of i-unit (Imaging Unit)
English
1
0
19
1.6K
Mark Ermolov
Mark Ermolov@_markel___·
ROSC - Ring Oscillator, a predecessor of CRO used in desktop platforms together with RTC clock PCLK - PCS clock, 1600 MHz SSC clock generated by LJPLL0 and used as a base for other clocks of PCS PLLs for CPU cores, memory controller, display engine and so on
English
1
0
18
1.7K
Mark Ermolov
Mark Ermolov@_markel___·
Intel chips have very complex clocking architectures (clock domains, controllers, generators) and almost all their tech details are NDA-ed. However, studying JTAG/VISA you always encounter abbrivations/entities relating to clocks. Here's most important of them:
English
2
18
214
9.8K