New Speculative Execution Security Flaw Cracks Intel's Software Guard Extensions
New Speculative Execution Security Flaw Cracks Intel's Software Baby-sit Extensions
Always since the plow of the year, when the Spectre and Meltdown flaws became publicly known, nosotros've seen a steady release of security updates for x86 and ARM processors. Of the two, Spectre — which is better understood as a class of flaws related to how speculative execution is commonly implemented in mod microprocessors — has been the bigger problem, with more than serious implications for long-term organisation security. But a new flaw, chosen Foreshadow, has surfaced. It's conceptually a bit closer to Meltdown rather than Spectre, and it breaks open Intel's Software Guard Extensions (SGX). Intel calls this bug L1TF, for L1 Terminal Fault.
That's a significant risk, given the purpose and design of SGX in the showtime place. SGX creates enclaves, or secure areas of memory where code and data are stored and encrypted. Data stored within an SGX enclave is encrypted before existence written to RAM and decrypted only one time within the CPU. The CPU also governs whatsoever access to the memory in question, which ways (at least in theory) that information technology shouldn't matter whether the host arrangement is compromised. Data within the hardware-locked enclave should remain secure at the hardware level. If yous can trust the CPU, you lot can trust the enclave.
Foreshadow works by attempting to read data within the enclave. This fails — the CPU prevents the activity. Simply because of how speculative execution works, the try to read the memory block does executes for a few instructions before existence rolled dorsum by the CPU to maintain its own country. This allows the attackers to infer the contents of kernel memory. The researchers also found a way to bypass the protection methods that are meant to continue SGX enclave information from beingness read by processes outside the enclave.
This video also explains the set on:
None of this is good, but there is some less-bad news. The researchers that discovered it accept been working with Intel for months — nigh, in fact, since the first Spectre and Meltdown details dropped. Microcode updates accept already been distributed that allow the CPU to flush the L1 enshroud upon leaving an enclave. Hyper-Threading still presents a potential risk factor, but Intel is promising that its Pour Lake CPUs, which ship later on this year, will not include either L1TF or Meltdown at all.
The consequence isn't completely resolved, and you lot should keep an centre on vendor notices regarding software and security updates, merely some of the work to mitigate the security chance has already been completed. To the best of our knowledge, this attack affects merely Intel CPUs.
Now Read: Spectre, Meltdown: Critical Security Flaws Explained, What Is Speculative Execution, and New Spectre Set on Surfaces as Intel Rolls Out Patch Schedule
Source: https://www.extremetech.com/extreme/275404-new-speculative-execution-security-flaw-cracks-intels-software-guard-extensions
Posted by: gonzalezdoemon.blogspot.com
0 Response to "New Speculative Execution Security Flaw Cracks Intel's Software Guard Extensions"
Post a Comment