Finally, the casket is opened: we (+@h0t_max and @_Dmit) have extracted Intel x86 microcode! One more Intel "top secret" information gets revealed…https://t.co/gFYcILxnHL pic.twitter.com/8lMMSoqW8k
— Mark Ermolov (@_markel___) May 19, 2020
Using the Local Direct Access Test (LDAT) DFT feature of Intel Atom CPU, we dumped Microcode Sequencer ROM. Also, we extracted what we think is IROM (Immediates for uops) and even managed to modify MS Patch RAM and Match/Patch registers
— Mark Ermolov (@_markel___) May 19, 2020
Here are all five Microcode Sequncer's arrays for Atom Goldmont core named according to our guesses (https://t.co/gFYcILfMQd). We'll publish the scripts lately…
— Mark Ermolov (@_markel___) May 19, 2020
https://github.com/chip-red-pill/glm-ucode
One thought on “Intel x86 microcode extracted”