X86 processor architecture vulnerabilities and Intrusion Detection and Prevention

Contributed by Timothy E. Robinson
For quite some time now, I have been interested in the computer engineering. I particularly enjoyed processor design and implementation. Designing and building x86 processors is a long and complicated process; there are many variables that have to be taken into consideration. Furthermore, there are many different ways to design the x86, however in this paper I will mostly tend to security issues. It would be impossible to include every aspect of the architecture of the x86 within this paper. However, I will pay some attention to few different aspects of the architecture which I believe are relevant to attain a deeper understanding of some of the proposed security concerns. One of those aspects is referred to FFL, otherwise known as Fixed Function Logic. Moreover, as this paper is for a security course, I will dive into several other topics that will be listed below that pertain to security. I will discuss intrusion detection systems and machine learning, intrusion prevention, various vulnerabilities found in the x86, and various exploitations and patches. Also, I will discuss the difference between RISC and CISC. Moreover, there are also a few more main points that I would like tend to, first and foremost, I would like talk about, the buffer overflow vulnerability and the Solaris Vulnerability. I will also cover the subject of intrusion detection and intrusion prevention.
This document is in PDF format. To view it click here.
Breaking out of Prison is easier than you think
Understanding Phishing and Protecting the 8th Layer
VXLAN EVPN Multi-Site Design and Implementation
Protecting Local Governments from Ransomware Attacks