![Mark Ermolov Profile](https://pbs.twimg.com/profile_images/535493812747911168/F_xolNlE_x96.jpeg)
Mark Ermolov
@_markel___
Followers
12K
Following
2K
Statuses
2K
I research security of Intel platforms. I don't work for Intel
Москва, Россия
Joined September 2014
@_MatteoRizzo @misc0110 Great work, congratulations! Waiting for AMD ucode ROM dump/disassembler...
0
1
15
RT @taviso: This was a huge research project -- at least some details are partially released today! 😩
0
39
0
@taviso Patch for a bug in the patch loading ucode in MSROM? That's unfixable in my opinion...
2
0
8
RT @taviso: welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linu…
0
59
0
RT @a13xp0p0v: Slides for my talk at @h2hconference 2024: Diving into Linux kernel security 🤿 I described how to learn this complex area…
0
82
0
RT @InstLatX64: #Intel opened a "Trusted Computing Base Recovery of Intel Trusted Execution Environments" page: htt…
0
4
0
RT @EduardKovacs: Intel has shared some clarifications on claims made by a researcher regarding the hacking of its SGX security technology.…
0
6
0
@sbellem To overcome the issue, yes, they should remove all known Root Provisioning Keys of GLK/R from their RAS databases
1
0
2
@Analytic_ETH @socrates1024 @PratyushRT @kobigurk That's CSME Anti Rollback Prevention. Most vendors don't enable it
1
0
1