• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
Computer Business World News

Computer Business World News

Trending News about Computers, Business and Tech

  • Home
  • BUSINESS
  • CAREERS
  • CLOUD
  • COMPUTERS
  • CYBERSECURITY
  • I.T.
  • TECH
  • VOIP
  • About

Intel processors vulnerable to more data theft attacks Lock

by

Researchers at the University of Illinois have discovered a new vulnerability in Intel CPUs that makes them vulnerable to side-channel attacks.

Examining Intel’s CPU ring interconnects, the trio, doctoral student Riccardo Paccagnella, master’s student Licheng Luo, and assistant professor Christopher Fletcher, discovered that the rings can be exploited for malicious purposes.

“It is the first attack to exploit contention on the cross-core interconnect of Intel CPUs,” Paccagnella told The Register, adding that since “the attack does not rely on sharing memory, cache sets, core-private resources or any specific uncore structures,” it can’t be mitigated with the existing defenses for side-channel attacks.

More Intel flaws

The researchers will present their findings later in the year at the USENIX Security 2021 conference.

The trio believe their new side-channel attack vector could leak encryption keys along and were also reportedly able to demonstrate the ability to monitor keystroke timings, which can be used to reconstruct typed passwords. 

The attacks were tested on Intel Coffee Lake and Skylake CPUs, and it isn’t clear whether the attack vector will work on newer Intel Xeon’s. 

For its part, Intel supported the researchers in their endeavor, but isn’t overly worried about their discovery. In fact it has clubbed their new attack vector alongside existing side-channel attacks.

“They treat this class of attacks differently than the class of ‘speculative execution / transient execution attacks’ (like Spectre, Meltdown, etc.). That is, they do not consider traditional side channel attacks as significant value for an attacker and they already published their suggested guidance on how to mitigate them in software,” shares Paccagnella.

Via: The Register

View Source

Filed Under: COMPUTERS

Primary Sidebar

More to See

After ‘The Voice’ and BET, two Mississippians give one last concert before heading to L.A. – Magnolia State Live

After ‘The Voice’ and BET, two Mississippians give one last concert before heading to L.A. Published 6:45 am Monday, January 30, 2023 … [Read More...] about After ‘The Voice’ and BET, two Mississippians give one last concert before heading to L.A. – Magnolia State Live

CSH Triples Its Computing Power

by Jake W Streamer | published Jan. 30th, 2023 … [Read More...] about CSH Triples Its Computing Power

4 tips for IT career growth in 2023

Despite increasing layoffs across the country, demand for IT pros remains high, especially for software developers and senior software … [Read More...] about 4 tips for IT career growth in 2023

Footer

SITE INFORMATION

COMPUTER BUSINESS WORLD NEWS

About/Contact

Privacy Policy

Thank you for visiting our website.

Recent

  • Russian millionaire on trial in hack, insider trade scheme
  • After ‘The Voice’ and BET, two Mississippians give one last concert before heading to L.A. – Magnolia State Live
  • CSH Triples Its Computing Power

Search

Copyright © 2023 Computer Business World