Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They probably defined some microcode operations -> created a minimal assembly language -> wrote it in C -> hand-optimized the asm output -> compiled to "machine" code

All the steps are things you cover in a computer engineering degree (I think), but putting them all together in a tightly constrained environment (or even recognizing that the exploit can happen in the first place) takes a ton of skill, resources, and dedication.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: