Breaking the x86 instruction set, Christopher Domas, Blackhat 2017
A processor is not a trusted black box for running code; on the contrary, modern x86 chips are packed full of secret instructions and hardware bugs. In this talk, we'll demonstrate how page fault analysis and some creative processor fuzzing can be used to exhaustively search the x86 instruction set and uncover the secrets buried in your chipset. We'll disclose new x86 hardware glitches, previously unknown machine instructions, ubiquitous software bugs, and flaws in enterprise hypervisors. Best of all, we'll release our sandsifter toolset, so that you can audit - and break - your own processor.
Qual trap vai acontecer? Instrução inválida ou page fault?
Aumente o tamanho em bytes enquanto for indicado que aconteceu page fault
main() {
int i, v[10];
for (i = 0; i < 10; i++)
v[i] = i;
}
HybridVerifier. Embedded Systems Letters, 2017
SHRINK: Reducing the ISA complexity via instruction recycling. ISCA 2015
Ecco, SBAC-PAD 2009