MicrocodeDecryptor
By chip-red-pill
uCodeDisasm
By chip-red-pill
MicrocodeDecryptor | uCodeDisasm | |
---|---|---|
15 | 7 | |
1,478 | 339 | |
- | - | |
0.0 | 3.4 | |
almost 2 years ago | 3 months ago | |
Python | Python | |
- | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MicrocodeDecryptor
Posts with mentions or reviews of MicrocodeDecryptor.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-07-22.
- Undocumented functions in cpu's and other complex hardware
- "Intel TXE" pažeidžiamumas buvo išnaudotas šifravimo raktui nustatyti
-
Embedded Systems Weekly #110
Microcode decryptor A team of researchers has released a tool to decrypt and unpack the microcode for some low-power Intel CPUs. This makes possible to understand how Intel has implemented various security fixes and features. Among the security fixes you can find the one about the famous Spectre vulnerability. Among the features you can dig into the implementation of Intel TXT, SGX or VT-x.
- Intel Microcode Decryptor
-
Hacker News top posts: Jul 20, 2022
Intel Microcode Decryptor\ (253 comments)
- Intel Microcode Decrpyor
- Intel Microcode decryptor
uCodeDisasm
Posts with mentions or reviews of uCodeDisasm.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-07-19.
- GitHub – chip-red-pill/uCodeDisasm
-
Intel Microcode Decrpyor
These researched managed to do this! (PoC). Modifying microcode is possible thanks to their previous work. By exploiting bugs in the BUP module (responsible for hardware bring-up/initialization) in the TXE firmware (Trusted Execution Engine, the Atom analogue of the Management Engine on Core/Xeon), they were able to eventually enable Intel's internal JTAG interface, also known as red unlock. This is normally disabled on production systems and requires keys from Intel to unlock it. However, a design flaw in BUP combined with code execution allowed red unlock to be enabled without Intel's keys. Red unlock is extremely powerful - not only does it let you debug the CPU core, it also lets you debug other devices and IP blocks (including TXE/ME). You can even use it to access internal microarchitectural state, including the microcode sequencer ROM. This allowed them to dump the (decrypted) microcode from a Goldmont CPU. They eventually managed to reverse engineer the micro-op format and released a microcode disassembler.
- MicrocodeDecryptor
-
Simulating the IBM 360/50 mainframe from its microcode
They're wider, but reverse engineering efforts suggest that they're actually "vertical". They only "appear" wider because, instead of multiple bytes to specify the operands, they're all encoded in the one micro-op. https://github.com/chip-red-pill/uCodeDisasm
- GitHub - chip-red-pill/uCodeDisasm - Intel Atom Goldmont microcode disassembler
- UCodeDisasm: Intel Atom Disassembler
- Microcode disassembler tool for Intel Atom Goldmont core
What are some alternatives?
When comparing MicrocodeDecryptor and uCodeDisasm you can also consider the following projects:
PicoCart64 - N64 development cart using a Raspberry Pi RP2040
Microcode - Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode
riscv-uefi-edk2-docs - Documentation and status of UEFI on RISC-V
crbus_scripts - IPC scripts for access to Intel CRBUS
IntelTXE-PoC - Intel Management Engine JTAG Proof of Concept
JJazzLab-X - Moved to JJazzLab repo
bashttp - µServer in Bash
build-your-own-x - Master programming by recreating your favorite technologies from scratch.
uefidoom - Port of Doom to UEFI.
CHIPnGo - A custom-built CHIP-8 hand-held gaming console powered by a STM32 microcontroller.
MicrocodeDecryptor vs PicoCart64
uCodeDisasm vs Microcode
MicrocodeDecryptor vs riscv-uefi-edk2-docs
uCodeDisasm vs crbus_scripts
MicrocodeDecryptor vs crbus_scripts
uCodeDisasm vs IntelTXE-PoC
MicrocodeDecryptor vs JJazzLab-X
MicrocodeDecryptor vs bashttp
MicrocodeDecryptor vs build-your-own-x
MicrocodeDecryptor vs uefidoom
MicrocodeDecryptor vs CHIPnGo
MicrocodeDecryptor vs IntelTXE-PoC