Dan Luu 2/3/2015

CPU backdoors

Read Original

This article argues that CPU backdoors are a plausible threat, explaining how they could be easily implemented with the right access. It details what a backdoor could do (like privilege escalation), how it could be triggered, and the level of compromise needed to install one, using historical software backdoors as context.

CPU backdoors

Comments

No comments yet

Be the first to share your thoughts!

Browser Extension

Get instant access to AllDevBlogs from your browser

Top of the Week

2
Designing Design Systems
TkDodo Dominik Dorfmeister 2 votes
4
Introducing RSC Explorer
Dan Abramov 1 votes
6
Fragments Dec 11
Martin Fowler 1 votes
7
Adding Type Hints to my Blog
Daniel Feldroy 1 votes
8
Refactoring English: Month 12
Michael Lynch 1 votes
10