Scientists claim to have invented the unhackable processor

An intriguing paper published by researchers at the University of Michigan describes a new processor architecture capable of self-encryption that can fend off any hacks. A DARPA-supported project, the new chip design renders the current electronic secu… Continue reading Scientists claim to have invented the unhackable processor

If x86 architecture has overflow flag in the CPU, then why can’t we use it to detect integer overflows in C binaries?

I’m talking about the overflow flag that is used in some architectures like x86:
https://en.wikipedia.org/wiki/Overflow_flag

why aren’t operating systems using this overflow flag to stop integer overflows?
what is the usag… Continue reading If x86 architecture has overflow flag in the CPU, then why can’t we use it to detect integer overflows in C binaries?

Qualcomm chips leak crypto data from secure execution environment

A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, NCC Group researchers have found. About CVE-2018-11976 The security of Truste… Continue reading Qualcomm chips leak crypto data from secure execution environment

Are the CPU protection rings meant to protect against malicious programs or against unintentional programming mistakes?

I am trying to understand what is the purpose of the CPU protection rings (specifically user mode and kernel mode).

I don’t think that the CPU protection rings are meant to protect against malicious programs, because a malic… Continue reading Are the CPU protection rings meant to protect against malicious programs or against unintentional programming mistakes?