Microcode: The Ghost in the Silicon
A deep-dive into the hidden layer of microcode. Explore its architecture, the non-persistent update process, the cryptographic protections (and weaknesses) of vendor signatures, and the modern microarchitectural attacks like Downfall and Zenbleed that have redefined hardware security.