the most magical exploit i've ever seen

the most magical exploit i've ever seen

Low Level

1 день назад

177,737 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@no-one_no1406
@no-one_no1406 - 23.05.2025 03:43

Not surprised that there are many bugs in intel branch prediction.
High frequency trading code optimization basically shows that the branch system is completely broken.

Ответить
@IcePhoenixOfTime
@IcePhoenixOfTime - 23.05.2025 04:37

Again branch prediction exploide?

Ответить
@FriendlyDevOps
@FriendlyDevOps - 23.05.2025 04:54

This is pretty incredible. I wonder how they were able to time when the cpu switched over to kernel mode.

Ответить
@IgorL-rv1mn
@IgorL-rv1mn - 23.05.2025 05:20

I thought this was going to be new. Yes it's rampant it's bin rampant and apple and Microsoft have bin milking it like nothing I've ever seen in my life.

Ответить
@lels3618
@lels3618 - 23.05.2025 07:56

🗣️🗣️ ETH MENTIONED 🗣️🗣️

Ответить
@JuanGil-c6n
@JuanGil-c6n - 23.05.2025 08:01

normies who dont know: 🤔
schizos who do know: 🧐

Ответить
@Lumi_Tassu
@Lumi_Tassu - 23.05.2025 08:12

stuff been going quite bad for intel as of recent
I really hope nothing more terrible happens (both jokingly and really - we need competition on the market - because of how market works - but I still am a AMD person)

Ответить
@NightOwl91
@NightOwl91 - 23.05.2025 09:50

That was very interesting, thank you.
A little context for US-based viewers, the ETH Zürich (spelled out E T H, not like the crypto 😉) is the most prestigious technological University of Switzerland and currently ranked 7th best University world wide.
For Europe it's akin to the MIT prestige-wise, so they really get some of the brightest researchers in the world.

Ответить
@nunya4815
@nunya4815 - 23.05.2025 10:48

I wonder what intels secret cpu inside some of its cou running the management engine vulnerability will be discovered to have since it can be accessed remotely

Ответить
@richbaird9407
@richbaird9407 - 23.05.2025 10:50

Everyone complaining about Intel security vulnerabilities are the same ones complaining about Intel year over year speeds.

Ответить
@jaysonrees738
@jaysonrees738 - 23.05.2025 12:03

Imagine how fast we could make stuff if we didn't have so many malicious people in the world.

Ответить
@aajas
@aajas - 23.05.2025 13:36

Using address arguments for non-lr instructions always felt like a mistake tbh

Ответить
@gguy156
@gguy156 - 23.05.2025 14:03

YEAAH Intel SUCKS (however, almost the same exploits were also applicable for AMD and even ARM). And I sell courses, guys!

Ответить
@teambridgebsc691
@teambridgebsc691 - 23.05.2025 14:14

Great teaching marred by gay shit.

Ответить
@UltimatePerfection
@UltimatePerfection - 23.05.2025 14:39

If it involves branch prediction, then it doesn't affect EVERY Intel CPU. I mean, a 486 doesn't have branch prediction.

Ответить
@dp3455
@dp3455 - 23.05.2025 14:40

There is such thing in ARM architecture - MPU (Memory Protection Unit) which defines memory region accessible by CPU in non privileged mode. Done. No brunch prediction bug or other bug can go beyond this region. SO given MPU is working and have no hw bugs and enabled and OS uses it - no such bugs are possible. Right?

Ответить
@dp3455
@dp3455 - 23.05.2025 14:46

But it is prediction? So altering prediction is not to equal to executing predicted altered brunch?

Ответить
@OuyaWoelders-hi9bn
@OuyaWoelders-hi9bn - 23.05.2025 14:48

gud i got amd

Ответить
@OuyaWoelders-hi9bn
@OuyaWoelders-hi9bn - 23.05.2025 14:50

ah only smart people use chrome

Ответить
@thesral96
@thesral96 - 23.05.2025 15:04

Eat Zürich?

Ответить
@edkachalov
@edkachalov - 23.05.2025 15:05

Is there any fix for this exploit?

Ответить
@NathonDalton
@NathonDalton - 23.05.2025 15:25

Computerphile has a great video on branch prediction.

Ответить
@snowdaysrule
@snowdaysrule - 23.05.2025 15:49

I still think the xbox 360 RGH is the most magical :)

Ответить
@Windows10doesntgrowontrees
@Windows10doesntgrowontrees - 23.05.2025 15:50

NOO MY INTEL CORE i5 1334U!! WHY IIINTELLLLLLL

Ответить
@ThePerfectToasterSetting
@ThePerfectToasterSetting - 23.05.2025 15:50

AMD bros just keep winning

Ответить
@fredbcruz
@fredbcruz - 23.05.2025 16:30

branch prediction is truly a hacky and buggy optimization

Ответить
@puffthemagiclepton7534
@puffthemagiclepton7534 - 23.05.2025 16:40

How much money is TSMC paying you?

Ответить
@jinbinongfu
@jinbinongfu - 23.05.2025 17:04

....you don't think anyone is an expert in microprocessors? wtf?

Ответить
@tellurium3754
@tellurium3754 - 23.05.2025 17:23

It's E-T-H Zürich, not Eeethh Zürich

Ответить
@georgecop9538
@georgecop9538 - 23.05.2025 17:32

Basically for Spectre and attacks like these it was the question "What gets reversed if a prediction is wrong?"

Ответить
@TheDesertBlizzard
@TheDesertBlizzard - 23.05.2025 17:37

Alright. Throw it all away. A return to 6502 is in order.

Ответить
@SecondFinale
@SecondFinale - 23.05.2025 18:27

Were Spectre and Meltdown not mitigated?

Ответить
@anthonybachler9526
@anthonybachler9526 - 23.05.2025 20:24

"We found a new Ring 0 exploit", meanwhile Im over here laughing because there are ring -5 exploits that let you reflash the microcode and run custom instruction sets all from ring 3.

Ответить
@MrChrisRP
@MrChrisRP - 23.05.2025 20:32

J Lo gives taco flavored kisses to her Ben.

Ответить
@crazyidiot5309
@crazyidiot5309 - 23.05.2025 21:00

This is insane.

Ответить
@43j832
@43j832 - 24.05.2025 00:39

Psst. Intel knew this. For a while. Think agencies

Ответить
@GilesBathgate
@GilesBathgate - 24.05.2025 00:43

Clearly nobody is a CPU microarcitecture expert, since we have vulnerabilities in CPU microarcitectures 😂

Ответить
@seti_o
@seti_o - 24.05.2025 01:35

"C the language that runs all other languages" .. ASM is like 🤨
How old are you - org 0x100 Lulz

Ответить
@edalder2000
@edalder2000 - 24.05.2025 02:59

I don't have to worry about this bug because my mini pc is Ryzen and my laptop is a Snapdragon ThinkPad.

Ответить
@TrebleWing
@TrebleWing - 24.05.2025 03:32

lololol, laughs in threadripper

Ответить
@TrebleWing
@TrebleWing - 24.05.2025 03:40

calling 'etc' by the name of 'etsy' is amazing. Never heard that before

Ответить
@Yupppi
@Yupppi - 24.05.2025 04:38

At the start of the video I understood that I have Intel, what is a race condition and what's branch prediction. I didn't have a clue on how they would combine. The rest I learned from LowLevelEddie. Also somehow Intel's gauntlet is like a list of Bond movies.

Ответить
@wasshattereddreams
@wasshattereddreams - 24.05.2025 05:14

I'm now tempted to try to run that in my work pc so I can finally use it as a normal human being, so no updating it for a while.
I have a work's pc more limited than a Internet Cafe in the 2000's and no way I'm doing the same repetitive job for 8 hours each day. And I'm tired of two computers to download/send to personal computer -> send to work computer.

Ответить
@Aim54Delta
@Aim54Delta - 24.05.2025 05:57

Branch prediction and speculative execution has always been an obvious invitation for security vulnerabilities. Basically, any time you allow the computer to go ahead and do things before you know whether or not it is allowed to do them, you have a problem.
AMD is not completely immune to it, but it does seem as though they have generally tried to engineer to minimize these kinds of conditions. Even then, I think a lot of it will come down to compartmentalizing use of systems. Security should be understood as something arising from tight control over; the operating conditions, hardware setup, and applications to the use case. You have to assume that hardware virtualization and privilege levels is contingent on good faith and that access by bad faith action can compromise it.

Ответить
@ValuedTeamMember
@ValuedTeamMember - 24.05.2025 07:45

"I knew that". Except for the "exploit" part of course ¯\_(ツ)_/¯

Ответить
@LowLevelTV
@LowLevelTV - 21.05.2025 18:04

kiss 4 u?

Ответить