Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
dooglius
on March 20, 2021
|
parent
|
context
|
favorite
| on:
Undocumented x86 instructions in Intel CPUs that c...
This would still break SGX/remote attestation, no? The chip can correctly say it's running some piece of assembly but if "ret" has been redefined to do whatever I want...
strstr
on March 20, 2021
|
next
[–]
The keys are stripped out if you put it into the required unlock mode.
userbinator
on March 20, 2021
|
prev
|
next
[–]
That would be a good thing, given what those features are usually used for (DRM and other user-hostility).
tkinom
on March 20, 2021
|
prev
|
next
[–]
I would love ability to redefine call/ret to profile an app without compiler generate diff code.
vlovich123
on March 20, 2021
|
parent
|
next
[–]
Can’t you do that through ebpf?
tkinom
on March 20, 2021
|
root
|
parent
|
next
[–]
My understand of ebpf can hook into the function calls in linux kernel.
Can one do that on user space app?
vlovich123
on March 20, 2021
|
root
|
parent
|
next
[–]
Yes, that is my understanding.
sodality2
on March 20, 2021
|
prev
[–]
This is what I'm interested in since they pushed that so heavily.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: