Tagged articles
3 articles
Page 1 of 1
Java Tech Enthusiast
Java Tech Enthusiast
Jun 9, 2024 · Information Security

Exploring Hidden x86 CPU Instructions and Their Security Implications

The article investigates undocumented x86 opcodes, describing a depth‑first search that uses page‑faults to locate hidden instruction boundaries, and reports finding dozens of executable but undocumented instructions on Intel and AMD CPUs, highlighting potential security risks and the need for vigilant hardware analysis.

AssemblyCPUSecurity
0 likes · 9 min read
Exploring Hidden x86 CPU Instructions and Their Security Implications
Liangxu Linux
Liangxu Linux
May 12, 2022 · Information Security

Do CPUs Hide Secret Instructions? Uncovering the Dark Corners of the x86 ISA

This article explores whether modern CPUs contain undocumented or hidden instructions, explains the challenges of searching the variable‑length x86 ISA, presents a depth‑first algorithm that skips irrelevant bytes, shows how to infer instruction length using page‑fault side‑effects, and reveals discovered hidden opcodes on Intel and AMD processors.

CPUInstruction SetSecurity
0 likes · 10 min read
Do CPUs Hide Secret Instructions? Uncovering the Dark Corners of the x86 ISA
IT Services Circle
IT Services Circle
Apr 15, 2022 · Information Security

Exploring Hidden x86 CPU Instructions and Their Security Implications

The article investigates whether modern x86 CPUs contain undocumented or hidden instructions, explains how to search the instruction space using a depth‑first algorithm that leverages page‑fault side‑effects to determine instruction length, and presents the results of uncovering such hidden opcodes on Intel and AMD processors, highlighting the potential security risks.

CPUhidden instructionsreverse engineering
0 likes · 11 min read
Exploring Hidden x86 CPU Instructions and Their Security Implications