Comment by neilv
2 years ago
> If we try to describe this feature and how the attackers took advantage of it, it all comes down to this: they are able to write data to a certain physical address while bypassing the hardware-based memory protection by writing the data, destination address, and data hash to unknown hardware registers of the chip unused by the firmware.
Did the systems software developers know about these registers?
No comments yet
Contribute on Hacker News ↗