zap wrote:
> then again, most processors are [insecure] too... but that's besides the point.
This paper documents a method (and open source tool) the
author developed to find undocumented and buggy intructions
in processors, assemblers, dissemblers, emulators and
hypervisors.
https://github.com/xoreaxeaxeax/sandsifter/blob/master/references/domas_breaking_the_x86_isa_wp.pdf
I found it quite accessible.
--
Joel Roth