Videos
Home » Videos » Exploiting vulnerabilities in the CPU microcode

Exploiting vulnerabilities in the CPU microcode

Pedro Candel
During the development of the workshop, you will see how to create an exploit from scratch for each of the three well-known recent “logo” vulnerabilities such as DirtyCOW, Specter and Meltdown. The development to be carried out is detailed for each of them. Once explained, the new attacks discovered will be detailed and how their exploitation is until finally reaching the last vulnerability discovered in Intel microprocessors.