You are on page 1of 2

8 NEWS BRIEFING

Newly discovered vulnerabilities in common Intel processor designs could


allow hackers to trick apps into revealing sensitive data such as passwords,
while the CPU kernel – the core of the operating system – is leaking memory.

which the operating systems


communicate with the kernel – a
core software layer – in such a
1 Speculative 2 Kernel mode: During Assumption A way that executed tasks could be
execution: Program speculative execution, code slowed by anywhere from 5 to 30
executes instructions and data remains invisible per cent.
based on assumptions in virtual memory Intel says the average user will
not experience significant
that are considered 3 slowdowns once the issue is
likely to be true. Program 2 fixed. In reality, benchmarks will
tells CPU to switch to Assumption B need to be carried out on patched
computers to gain a full
kernel mode – understanding of how their
technique improves performance is affected.
performance The flaw affects all Intel chips
produced in the last decade,
although more modern chips
3 Best guess: include features such as PCID
Virtual Kernel predicts code that could help to negate the
memory to be run next and slowdown to some extent.
Google’s Project Zero team
1 executes it. said that the flaw could allow
Code is ignored if access to passwords and other
not needed – CPU sensitive data from a system’s
switches back to memory.
The tech company disclosed
user mode. the vulnerability not long after
Flaws allow Intel said it was working to
kernel access patch it.
Central protections to be Intel has known about the
processing unit problem since June last year;
bypassed Krzanich sold off a large portion
of his stake in the company in
Patches Meltdown: Most dangerous flaw could let hackers October. Shares in the company
steal data such as passwords and login files fell by 3.4 per cent shortly after
Spectre: Flaw affects CPUs in smartphones and tablets. the news was revealed.
Tech companies typically
Patches move kernel into separate address space – expected withhold details about security
to cause five to 30 percent slow down to processing speed problems until fixes are available
so that hackers do not have time
to exploit the flaws.
In this case, Intel was forced to
disclose the problem on
SECURITY 3 January after British
technology site The Register

Design flaws reported it.


Google said it also affects
other processors and the devices
and operating systems running

put sensitive
them.
Although Intel cited rival
AMD as one of the companies it
is working with to address the
problem, AMD said in a

data at risk
SOURCES: POPULAR MECHANICS, THE REGISTER, REUTERS, © GRAPHIC NEWS, PA

statement that it believes its


chips are safe because they use
different designs.
However, the aforementioned
changes to the way in which
operating systems access the
JACK LOUGHRAN kernel could still have an impact
on those running AMD chips, at
A MAJOR WEAKNESS has been Meltdown and Spectre, which Krzanich said Intel would least in the short term.
discovered in Intel’s processor will be released to consumers in issue updates for more than Some businesses have held off
chips by Google security the coming days and weeks. 90 per cent of processors installing software patches,
researchers that could see “As of now, we have not introduced in the past five years fearing the cure may be worse
hackers gain access to passwords received any information that by 15 January, and the remainder than the original problem.
and other confidential these exploits have been used to by the end of the month. “We will Rather than rushing to put out
information on Windows, Mac OS obtain customer data,” said Intel then focus on issuing updates for patches, a costly and time-
and Linux. CEO Brian Krzanich. “We’re older products as prioritised by intensive endeavour for major
The makers of these operating working tirelessly on these our customers,” he added. systems, some businesses are
systems are already preparing issues to ensure it stays that But the nature of the fix will testing the fix, leaving their
fixes to close the flaws, dubbed way.” fundamentally alter the way in machines vulnerable.

Engineering & Technology February 2018 www.EandTmagazine.com


9

COMMENT
A MELTDOWN IN COMPUTER ARCHITECTURE
Attackers are taking
advantage of the many
“If you start applying patches novel instructions
across your whole fleet without processor makers
doing proper testing, you could such as Intel have
cause systems to crash, added to their designs
essentially putting all of your
employees out of work,” said Ben
Johnson, co-founder of cyber-
security startup Obsidian.
Banks and other financial
institutions spent much of the
week after the announcement
studying the vulnerabilities, said
Greg Temm, chief information
risk officer with the Financial
Services Information Sharing
and Analysis Center (FS-ISAC),
an industry group that shares
data on emerging cyber threats.
“It’s like getting a diagnosis of BY CHRIS EDWARDS processed. A game of cat and The Spectre paper authors
high blood pressure, but not mouse has ensued with attacks point to AMD’s claims for its
having a cardiac arrest,” Temm Processor manufacturers and and countermeasures Ryzen processors, which
explained. “We’re taking it operating system providers appearing that take advantage apparently sport “an artificial
seriously, but it’s not something have been struggling to cope of the many novel instructions intelligence neural network that
that is killing us.” with the implications of a wide- processor makers such as Intel learns to predict what future
Banks are testing the patches ranging group of security flaws have added to their designs. pathway an application will take
to see if they slow operations becoming public before they The TSX extensions for based on past runs”. Good luck
and, if so, what changes need to could put even a first line of transactional memory, for assessing the intricate security
be made, said Temm. For defence in place. example, have been proposed implications of something that
instance, computers could be The Meltdown and Spectre as mechanisms for channelling changes behaviour as it runs.
added to networks to make up for attacks described in academic secret data to spyware as well The authors argue: “Long-
the lack of processor speed in papers and also by Google as protecting against attacks. term solutions will require that
individual machines, he added. researchers are less Transactional memory was instruction set architectures be
Mike Buckbee, security troublesome than others that invented to make programs that updated to include clear
engineer at Varonis, said: have made the headlines in run across multiple cores more guidance about the security
“This vulnerability makes it recent years. They are about efficient by letting them run properties of the processor, and
theoretically possible to open information leaking rather than speculative operations safely. CPU implementations will need
up the end-user’s device and providing ways of letting a That speculative execution to be updated to conform.”
rummage through the hacker take control of a system. means the programs don’t have Although this will probably
computer’s memory. For Both rely on the hacker already to keep stopping to check happen, it might not make that
example, a JavaScript being able to load software onto everything is in sync. This plays much difference. The practical
application running in a a computer, typically using a a key role in the Meltdown and long-term solution seems more
browser on a website could Trojan horse program. Spectre attacks. likely to be about a better
potentially access your Although these attacks use When they generate code, separation of what is secure and
computer’s kernel memory novel techniques, they fit into a compilers take a guess at the what is unsafe, and to take
and rip through any information much broader class of side- best order for instructions but advantage of the economics of
held there. channel attacks that let hackers have to err on the safe side. silicon. Transistors are cheap
“While it’s unlikely there eavesdrop on the processing Processors can take more risks and will get cheaper. Moving
would be full files stored there, performed by supposedly secret with instruction ordering when it secure operations into parallel,
it’s very possible it would find code. A decade ago, comes to execution because, if firewalled processors provides
bits and pieces of valuable data, researchers from the Weizmann things don’t work out, they can the best option for guaranteeing
like SSH keys, security tokens Institute of Science in Israel roll back or cancel instructions. security properties that do not
and even passwords. found a security loophole in the Typically, this provides a solid need years of analysis to create.
“To counteract the threat, caches used to hide the huge speedup around the branches in Understanding which
patches for all operating systems discrepancy between the speed code that would otherwise stall operations need to be behind
are in the works. These patches of processors and the memory execution. the security barrier becomes a
‘scramble’ how kernel memory is they use to store large quantities Meltdown uses the side job for the software architects.
stored, making it impossible for of data. Their exploit, called effects of speculative execution, But as such changes involve
applications to exploit the flaw. Prime+Probe, made it possible such as data being left in rethinking the architecture of
“While all the details are not for software to spy on other caches, and harnesses TSX and operating systems and support
available at this point, from what applications running alongside similar mechanisms to access software, they are not quick
is known this vulnerability can it, even in situations where the the data. Spectre is a wider- fixes. There will be pressure on
be considered a threat. It could processor and operating system ranging set of attacks that tryto processor designers to compile
allow for credential theft or other were meant to isolate them. exploit other side effects. reams of text on the security
privilege escalation exploits. In The hack works by having the OS writers and processor properties of their creations.
this respect, while potentially spyware fill up cache lines with makers are working out ways to However, trying to continually
dire, it’s very similar to an garbage and continually poke at plug the holes the push for fix the leakage problems of
insider threat or admin data the memory subsystem to work performance has had on features intended to keep
breach. out when other software made security. At the same time, the software running fast is
“Organisations need to layer changes. Subtle timing processor designers are trying ultimately doomed to failure. The
multiple levels of protection to differences would indicate how to overcome the performance practical solution is true
build defensive depth in their the target application was limitations of memory and hardware-enforced and
networks and applications,” making decisions on the data it multicore operation. software-managed separation.
Buckbee concluded.

www.EandTmagazine.com February 2018 Engineering & Technology

You might also like