X86 processor architecture vulnerabilities and Intrusion Detection and Prevention

Contributed by Timothy E. Robinson
For quite some time now, I have been interested in the computer engineering. I particularly enjoyed processor design and implementation. Designing and building x86 processors is a long and complicated process; there are many variables that have to be taken into consideration. Furthermore, there are many different ways to design the x86, however in this paper I will mostly tend to security issues. It would be impossible to include every aspect of the architecture of the x86 within this paper. However, I will pay some attention to few different aspects of the architecture which I believe are relevant to attain a deeper understanding of some of the proposed security concerns. One of those aspects is referred to FFL, otherwise known as Fixed Function Logic. Moreover, as this paper is for a security course, I will dive into several other topics that will be listed below that pertain to security. I will discuss intrusion detection systems and machine learning, intrusion prevention, various vulnerabilities found in the x86, and various exploitations and patches. Also, I will discuss the difference between RISC and CISC. Moreover, there are also a few more main points that I would like tend to, first and foremost, I would like talk about, the buffer overflow vulnerability and the Solaris Vulnerability. I will also cover the subject of intrusion detection and intrusion prevention.
 
This document is in PDF format. To view it click here.

Rate this article: 
No votes yet