BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//why2025//PLAJ7V
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-9WTQU3@program.why2025.org
DTSTART;TZID=CET:20250808T190000
DTEND;TZID=CET:20250808T195000
DESCRIPTION:We present EntrySign\, a cryptographic flaw in AMD’s microcod
 e patch verification logic\, including how we discovered the bug and how y
 ou can extend our results. EntrySign lets us execute arbitrary microcode o
 n all AMD CPUs from Zen to Zen 5 and modify the behavior of x86 instructio
 ns. We will delve into the format of AMD microcode\, how their patches are
  verified\, how we were able to reverse engineer this process\, and how we
  were able to access the key information required to defeat it.
DTSTAMP:20250731T184953Z
LOCATION:Cassiopeia
SUMMARY:EntrySign: create your own x86 microcode for fun and profit - Nspac
 e\, spq
URL:https://program.why2025.org/why2025/talk/9WTQU3/
END:VEVENT
END:VCALENDAR
