Researchers from Tsinghua University, the University of Maryland, and Beijing University of Posts and Telecommunications have discovered a new side-channel attack vulnerability in Intel processors that permits data leakage through the EFLAGS register. The vulnerability was presented in a paper released last week and is the latest addition to the list of side-channel attacks that have been plaguing Intel CPUs for years. Unlike previous exploits, this new attack does not depend on the cache system but focuses on timing analysis of transient executions, making it more difficult to detect such attacks.
The vulnerability enables data to be deciphered via timing analysis, to which intruders gain access by reading non-code-related patterns such as timing, power consumption, electromagnetic and acoustic emissions. This new attack causes a change of the EFLAGS register in transient execution, which slows down subsequent jump instructions. Exploited in conjunction with a Meltdown attack, it enables intruders to gain access to code that they would not otherwise have access to. The team demonstrated the vulnerabilities on Intel Core i7-6700, i7-770, and i9-10980XE CPUs.
The authors of the paper state that the increasing complexity and aggressive optimizations of modern CPUs with their many microarchitectural features are the root cause of many security issues, including side-channel attacks. However, the specific cause of the vulnerability is not fully understood. The researchers speculate that there is some buffer in the execution unit of the Intel CPU which needs some time to revert if the execution should be withdrawn. This withdrawal process will cause a stall if the following instructions depend on the target of the buffer.
The vulnerability relies on other transient execution attacks to effect a real-world attack. Still, the authors believe that it is a new side-channel attack that is worth further exploration because it may provide insight into new microarchitecture attacks and open new ways to build side-channel attacks in cache side-channel resistant CPUs.
Intel 11th generation CPUs appear to be more resistant to such attacks. Additionally, Intel‘s new 13th generation vPro processors are equipped with stronger defenses against side-channel attacks. However, this latest discovery highlights the need to develop even stronger security measures to protect against such attacks.
In conclusion, this new side-channel attack vulnerability in Intel processors reinforces the urgency for businesses, organizations, and individuals to take internet security seriously. There is a need for more resilient systems with robust security protocols to protect against cybersecurity threats like these. The vulnerability is a wake-up call for Intel and the industry to continue to develop secure systems to keep pace with cyber attackers’ techniques.
<< photo by FLY:D >>
You might want to read !
- Innovative digital solutions promise to eradicate cybercrime, say researchers
- “Deceptive Hackers Distribute Malware Under the False Promise of AI Innovation”
- “Boldly Going beyond Fiction: Cybersecurity Lessons from ‘Star Trek: Picard’”
- “Revolutionizing Wireless Security: The Quantum Physics Approach”
- US-Europe Law Enforcement Coordination Yields 300 Arrests in Dark Web Drug Crackdown
- “Unveiling the Vulnerabilities of AMD’s fTPM: A Critical Security Flaw”
- Why slow response to security gaps in cryptocurrencies may prove detrimental, warn researchers
- The Dark Reality: Study Reveals Children’s Webcams are a Prime Target for Online Predators
- “Unlocking the Future: The Rise of Passkeys and Password Alternatives”
- Exploring the Rise of Chat App Hacking: Operation ChattyGoblin Targets Gambling Firms