Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

New Spectre, Meltdown variants leave victims open to side-channel attacks <p>
TechRepublic ^ | February 15, 2018 | By Conner Forrest

Posted on 02/19/2018 3:53:27 PM PST by Swordmaker

MeltdownPrime and SpectrePrime, found by Princeton and NVIDIA researchers, may require significant hardware changes to be mitigated.

Security researchers from NVIDIA and Princeton have discovered new variants of the Meltdown and Spectre flaws that may be more difficult to tackle than the originals. Dubbed MeltdownPrime and SpectrePrime, these flaws were further detailed in a recent research paper.

The software changes already underway will likely take care of these two exploits, but the coming hardware fixes won't, the researchers noted in the paper. The researchers said they believe the "hardware protection against them will be distinct," which means that chip makers may need to further change their designs to mitigate the threats.

After creating their own tool to synthesize the Spectre and Meltdown flaws, the researchers were able to use their findings to conduct side-channel attacks, or attacks that take advantage of the physical hardware related to a system's security. The side-channel attacks in this exploit are cache-based and rely on the timing of cache activity to glean information, the report said.

(Excerpt) Read more at techrepublic.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; malware; meltdown; spectre; windowspinglist
Navigation: use the links below to view more comments.
first 1-2021 next last

1 posted on 02/19/2018 3:53:27 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

LMAO! My boss is already going gray(er) over Spectre/Meltdown. Now this?

I wonder if the FBI knew about this and didn’t tell anyone... /sarc


2 posted on 02/19/2018 3:56:33 PM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored; ThunderSleeps; ShadowAce; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; ...
New variants of the Spectre and Meltdown hardware hitting malware that crosses all platforms has been shown in proof of concept form that demonstrates that the proposed hardware fixes will not work as proposed. Deeper and more fundamental changes will most likely have to be made. Very worrisome. —PING!

pinging dayglored, ThunderSleeps, and ShadowAce for their ping list attention.


Spectre Prime and Meltdown Prime Malware Ping!

If you want on or off the Mac Ping List, Freepmail me.

3 posted on 02/19/2018 3:58:15 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

No troll intended here, Sword, but do you know why they would have used a Mac to test the POC? Says in the article the exploit was tested on a Mac. Just curious if Apple’s platform is “better” for this test vs. Windows or Linux.


4 posted on 02/19/2018 4:02:31 PM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

I’m still amazed this went on for so long without anybody noticing.

I’ve worked with embedded systems doing high performance coding and we always just assumed that once the cache path was invalidated that it was inaccessible.


5 posted on 02/19/2018 4:02:57 PM PST by Skywise
[ Post Reply | Private Reply | To 1 | View Replies]

To: Skywise

Processor development has always been a “black box.” I would bet good money that as quantum computing becomes more accessible, these types of hardware exploits will become more common and easily exploitable on aging platforms.


6 posted on 02/19/2018 4:04:20 PM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: rarestia

Yeah - but as a low level developer we’re well aware of that fact that you don’t leave encrypted items in memory “lying” around because it’ll get exploited in your app.

It’s just unfathomable (though probably not that surprising) that the processor manufacturers never implemented that in their designs.


7 posted on 02/19/2018 4:07:08 PM PST by Skywise
[ Post Reply | Private Reply | To 6 | View Replies]

To: Skywise

“But... they’re encrypted.”

/sarcasm


8 posted on 02/19/2018 4:08:46 PM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

9 posted on 02/19/2018 4:11:01 PM PST by Bratch ("The only thing necessary for the triumph of evil is for good men to do nothing." - Edmund Burke)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

If your automobile manufacturer is discovered to have included (even by accident) a flaw that allows theives to take your car at-will, or to hijack your car remotely and put you and the general public at risk - who would be held accountable for that flaw? The manufacturer - no matter the cost.

If your bank runs software that has a security gap that allows thieves to take money from them at-will - who is accountable for that flaw? Your bank and their tech suppliers.

So - with millions and millions of computers across platforms likely targeted because of a FLAW (think design flaw when it comes to some states and their product liability law) who should be held accountable for fixing and repairing what they left (accidentally or otherwise) open because of a design flaw?


10 posted on 02/19/2018 4:18:41 PM PST by TheBattman (Voting for lesser evils still gets you evil...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

Lots of possibilities - but while I’m not Swordmaker - I would suspect that this is because there are so scarce other exploits on the Mac platform that they are less likely to get “contaminated” test results?


11 posted on 02/19/2018 4:20:15 PM PST by TheBattman (Voting for lesser evils still gets you evil...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: TheBattman

That’s fair. But Linux too?


12 posted on 02/19/2018 4:21:16 PM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: rarestia; Skywise

Knew about it? My guess is these were Fed-mandated CPU backdoors, which are now out there only because the secrecy of their existence has been compromised (for example, see https://i.redd.it/gtsboykb98b01.png).


13 posted on 02/19/2018 4:25:10 PM PST by XEHRpa
[ Post Reply | Private Reply | To 2 | View Replies]

To: XEHRpa

While I love me a good conspiracy, I find it hard to believe that every OS developer was caught unaware of this. If they weren’t, they’re complicit. If they were, they were incompetent.


14 posted on 02/19/2018 4:26:26 PM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: rarestia

I’ll take Complicit for $200, Alex.


15 posted on 02/19/2018 4:27:52 PM PST by XEHRpa
[ Post Reply | Private Reply | To 14 | View Replies]

To: TheBattman

That is complete BS.

The reason is the developer preferred Macs.


16 posted on 02/19/2018 4:56:17 PM PST by for-q-clinton
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker
They were always side channel. Such side channel attacks have been proposed for years but were never viable. Nothing has changed, fixes or not.

The important point, as it has always been, is that the attacker has to run arbitrary code on your CPU to even start the attack. The only case on a PC where somewhat arbitrary code is run (other than user error) is javascript in a web browser and it is quite easy to protect browsers against that. On Mac there are protections built into firmware that would preclude OS level attacks (e.g. would preclude persistence)

The other case is where people are running arbirary code on virtual machines that they are renting in the cloud. Those are obviously more concerning to cloud vendors and cloud users, but only to those people.

17 posted on 02/19/2018 5:31:49 PM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ...
More Meltdown and Spectre variants ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Swordmaker for the ping!

18 posted on 02/19/2018 5:57:45 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 3 | View Replies]

To: rarestia

While I love me a good conspiracy, I find it hard to believe that every OS developer was caught unaware of this.

well, you can have your cake and eat it too. We know the government's bag of hacking tools was stolen, so there's NO reason to think this wasn't part a part of that, with the cooperation of hardware manufacturers. They're just not owning up to it.

IMHO there is almost no end to the evil that is the deep US government.


19 posted on 02/19/2018 6:12:37 PM PST by 867V309 (Lock Her Up)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Swordmaker

How long before some kids pacemaker is hacked, the kid dies, and the father tracks down and takes out the hacker,


20 posted on 02/20/2018 12:50:52 AM PST by BTerclinger (MAGA)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson