Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Intel Processor’s Hidden Security Feature Uncovered

admin by admin
Jun 11, 2023
in News
A A
0

Computer scientists uncover a previously unknown security feature in Intel processors that provides robust protection against attacks, including the notorious Spectre vulnerability, Cyber Security News learned from researchers at UC San Diego and Purdue University.

In a groundbreaking study titled “Half&Half: Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution,” researchers from UC San Diego and Purdue University have successfully reverse-engineered Intel’s flagship processors, unraveling their conditional branch predictors spanning over a decade.

CSN

Conditional branch instructions play a crucial role in modern software, influencing the execution of instructions based on data values—approximately 10 to 20 percent of all instructions executed fall under this category.

Intel’s Branch Predictor

To optimize processing speed, modern processors employ branch predictors that anticipate the outcome of conditional branches, enabling uninterrupted execution until the branch’s result becomes known much later in the pipeline.

However, existing processors share the branch predictor among all threads and processes, resulting in severe security vulnerabilities

. Malicious actors can exploit these vulnerabilities to observe branch outcomes in targeted programs and gain access to confidential data such as passwords and encryption keys.

Furthermore, specific Spectre attacks leverage the branch predictor by injecting data to extract sensitive information stored in memory.

Despite no previous comprehensive analysis of Intel’s predictors, even those introduced over a decade ago, the researchers successfully reverse-engineered the predictors’ structures, sizes, and lookup functions.

Intel’s branch predictor consists of four tables, and the lookup functions employ complex hashing techniques based on data collected from up to 194 previous branch instances. Surprisingly, the researchers discovered that modifying a single bit of the branch address could partition the branch predictor into two parts.

Half&Half – Eliminating Data Leakage

“By making a minor change in code generation, we can now concurrently run two threads on the same processor core, eliminating data leakage through the branch predictor and thwarting Spectre attacks,” explained Hosein Yavarzadeh, the lead author of the paper and a PhD student in Computer Science and Engineering at UC San Diego, via report shared with Cyber Security News.

CSE Professor Dean Tullsen expressed his astonishment at this finding, noting the intricate nature of the indexing functions and the unlikely isolation of a single bit without interdependencies. He further stated, “While we would have been thrilled if Intel had planned such a feature intentionally for future processors, it was mind-boggling to discover that this security-enhancing capability has existed in every major Intel processor for more than a decade, with almost no awareness of its security implications.”

Kazem Taram, a professor at Purdue University and CSE alumnus, highlighted the conditional branch predictor’s mysterious nature, regarded as the most challenging component to reverse-engineer.

Half&Half Authors

Taram expressed excitement over the newfound insights into the functionality and detailed structure of branch predictors, previously shrouded in secrecy for both security and performance researchers.

Previously, the prevailing software techniques for achieving conditional branch isolation between threads incurred a performance overhead ranging from 50 to 100 percent.

However, the Half&Half approach offers the same security protection against branch predictor leaks with a minimal 2 to 5 percent performance cost, achieved through a straightforward modification to compiler code generation.

The discovery of this hidden security feature in Intel processors marks a significant breakthrough in computer security, demonstrating how a small change can yield substantial results.

The Half&Half approach opens doors to enhanced protection against critical vulnerabilities, safeguarding sensitive data from malicious attacks like Spectre.

Stop Advanced Email Threats That Target Your Business Email – Try AI-Powered Email Security

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.