Close Menu
  • Home
  • Vaccines
  • Politics
  • Health
  • Tech
  • Sports
  • Research
  • Fitness
  • Careers
What's Hot

Health Canada approves Novartis’ KISQALI® for HR+/HER2- early breast cancer patients at high risk of recurrence

Sheriff, county lawyer seeking mental health funds at Minnesota State Capitol

Chronic absences have not disappeared. Research shows that poor children are most hurt.

Facebook X (Twitter) Instagram
subjectional.com
Subscribe
  • Home
  • Vaccines
  • Politics
  • Health
  • Tech
  • Sports
  • Research
  • Fitness
  • Careers
subjectional.com
Home » New research reveals Specter vulnerability in modern AMD and Intel processors
Research

New research reveals Specter vulnerability in modern AMD and Intel processors

Paul E.By Paul E.October 29, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


October 29, 2024Ravie LakshmananHardware Security/Vulnerabilities

More than six years after the Specter security flaw affecting modern CPU processors was revealed, new research shows modern AMD and Intel processors are still susceptible to speculative execution attacks. It turned out.

The attack, revealed by ETH Zurich researchers Johannes Wichner and Kaveh Razavi, weakens the Indirect Branch Prediction Barrier (IBPB) on x86 chips, a key mitigation against speculative execution attacks. The aim is to make it possible.

Speculative execution is a performance optimization feature that allows modern CPUs to predict program branches in advance and execute certain instructions out of order, speeding up tasks if the speculatively used values ​​are correct. refers to.

If the prediction is wrong, the instruction, called transient, is declared invalid and discarded before the processor resumes execution with the correct value.

Although the results of the execution of a temporary instruction are not reflected in the architectural program state, a forced misprediction can load certain sensitive data into the processor cache, thereby exposing that data to a malicious user. It would be exposed to some attackers and access would otherwise be blocked. .

Intel describes IBPB as “an indirect branch control mechanism that establishes a barrier and prevents software executed before the barrier from controlling the predicted targets of indirect branches executed after the barrier on the same logical processor.” I’m doing it.

This counters Branch Target Injection (BTI), also known as Specter v2 (CVE-2017-5715), which is a cross-domain temporary execution attack (TEA) that leverages indirect branch predictors used by processors to trigger disclosure. used as a method. A speculatively executed gadget.

Disclosure Gadget refers to an attacker’s ability to access architecturally invisible secrets of a victim and steal them through covert channels.

Recent findings from ETH Zurich indicate that microcode bugs in Intel microarchitectures such as Golden Cove and Raptor Cove can be used to circumvent IBPB. This attack is said to be the first actual “end-to-end cross-process Specter leak.”

The researchers said the microcode flaw “retains branch prediction, which could potentially be used even after IBPB disables branch prediction.” “Such post-barrier speculation allows attackers to bypass the security boundaries imposed by process context and virtual machines.”

AMD’s IBPB variant discovered in the research could similarly be bypassed due to the way the Linux kernel applies IBPB, resulting in an attack codenamed Post-Barrier Inception (also known as PB Inception). , allowing an unprivileged attacker to leak privileged memory. On AMD Zen 1(+) and Zen 2 processors.

Intel has made available a microcode patch to address this issue (CVE-2023-38575, CVSS score: 5.5). AMD is tracking this vulnerability as CVE-2022-23824, according to an advisory released in November 2022.

“Intel users should ensure that their Intel microcode is up to date,” the researchers said. “AMD users should always install kernel updates.”

The disclosure comes several months after researchers at ETH Zurich detailed new RowHammer attack techniques, codenamed “ZenHammer” and “SpyHammer,” the latter of which uses RowHammer to determine DRAM temperatures with high precision. I guess.

“RowHammer is very sensitive to temperature fluctuations, even if the fluctuations are very small (e.g., ±1 °C),” the study states. “The bit error rate caused by RowHammer consistently increases (or decreases) as temperature increases, and some DRAM cells that are vulnerable to RowHammer exhibit bit errors only at certain temperatures. .”

By leveraging RowHammer and temperature correlation, an attacker could determine the usage of a computer system and potentially measure the ambient temperature. This attack could also compromise privacy by using temperature measurements to determine people’s habits in the home and when they enter and leave rooms.

“SpyHammer is a simple and effective attack that can monitor the temperature of critical systems without any modification or prior knowledge of the victim’s system,” the researchers said.

“Until definitive and fully secure RowHammer defense mechanisms are adopted, SpyHammer remains a potential threat to system security and privacy. RowHammer vulnerabilities continue to worsen as technology expands. This is a big challenge considering that

Did you find this article interesting? Follow us Twitter ○ You can read more exclusive content from us on LinkedIn.




Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHelen’s tragedy threatens health care access in western North Carolina
Next Article EARLY VOTING: A week after Election Day, early voters look different than they did four years ago.
Paul E.
  • Website

Related Posts

Chronic absences have not disappeared. Research shows that poor children are most hurt.

June 5, 2025

American Brain Tumor Society’s Metastatic Brain Tumor Collaborative Announces $50,000 Research Grant Opportunity to Fund High-Risk, High-Impact CNS Metastasis Research

October 31, 2024

Massive yard sale in Newtown benefits pancreatic cancer research

October 31, 2024
Leave A Reply Cancel Reply

Latest Posts

Health Canada approves Novartis’ KISQALI® for HR+/HER2- early breast cancer patients at high risk of recurrence

Sheriff, county lawyer seeking mental health funds at Minnesota State Capitol

Chronic absences have not disappeared. Research shows that poor children are most hurt.

Transport Secretary reveals overhaul of aging pneumatic transport systems

Latest Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to Subjectional!

At Subjectional, we believe that informed opinions are the foundation of a vibrant society. Our mission is to provide insightful, engaging, and balanced information across a diverse range of topics that matter to you. Whether you’re interested in the latest developments in health, navigating the complexities of politics, staying updated on sports, exploring technological advancements, or advancing your career, we’ve got you covered.

Facebook X (Twitter) Instagram Pinterest YouTube

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 subjectional. Designed by subjectional.

Type above and press Enter to search. Press Esc to cancel.