I am Dave Jing Tian, an Assistant Professor in the Department of Computer Science at Purdue University working on system security. My research involves embedded systems, operating systems, trusted and confidential computing, and hardware security and trust. All opinions are my own.
- 236,456 hits
All blogs on this website are licensed under a Creative Commons Attribution 4.0 International License.
Tag Archives: x86_64
Syscall hijacking in 2019
Whether you need to implement a kernel rootkit or inspect syscalls for intrusion detection, in a lot of cases, you might need to hijack syscall in a kernel module. This post summorizes detailed procedures and provides a working example for … Continue reading
This post talks about 3 commits I have recently added into my own valgrind tree , including the support for fsgsbase instructions, rdrand/rdseed instructions, and adding a new trapdoor (client request) to support gdb-like add-symbol-file command. Note that all these … Continue reading
Posted in Dave's Tools, Programming Tagged add-symbol-file, cpuid, fortanix, fsgsbase, gdb, rdrand, rdseed, trapdoor, valgrind, x86_64 Leave a comment
Valgrind trapdoor and fun
Valgrind has a client request mechanism, which allows a client to pass some information back to valgrind. This includes asks valgrind to do a logging in its own environment, tells valgrind a range of VA being used as a new … Continue reading
Posted in Programming, Security Tagged trapdoor, valgrind, VEX, x86_64 Leave a comment
SGX Bug SKL012 and CHIPSEC
Intel SGX CPU (staring from Skylake) has been there for while. The good news is that there is still no known exploitation against SGX self yet, though there are some exploitations in the enclave code and Intel SGX SDK. In … Continue reading