Pietro Borrello Profile picture
PhD Student in Computer Science Engineering at @SapienzaRoma. Pwner at @TheRomanXpl0it and @mhackeroni. https://t.co/g77o9Ojdjf
Mar 8, 2023 4 tweets 3 min read
I'm super happy to share that our work "CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode" has been accepted at #WOOT23! 🎉
We extend our #BHUSA work to show how microcode tracing and patching can be useful to improve CPU performance and security 👀 Image + We trace microcode updates to reverse engineer the secret Intel microcode update algorithm and perform its security evaluation.
+ We present the first x86 PAC implementation, attack it with PACMAN, and provide the first public PAC implementation not vulnerable to the attack.
Aug 9, 2022 4 tweets 4 min read
Today we disclose ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture 🔥
It is the *first* architectural CPU bug able to leak sensitive data from the cache hierarchy: like an uninitialized read but in the CPU itself.

aepicleak.com Image It affects 10th, 11th and 12th generation Intel CPUs, where the undefined range in APIC MMIO region returns stale data.
ÆPIC Leak is *not* a transient execution attack: it is a bug in the CPU itself. In our work, we show how it precisely allows us to fully dump enclave in seconds