• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
Computer Business World News

Computer Business World News

Trending News about Computers, Business and Tech

  • Home
  • BUSINESS
  • CAREERS
  • CLOUD
  • COMPUTERS
  • CYBERSECURITY
  • I.T.
  • TECH
  • VOIP
  • About

Intel processors vulnerable to more data theft attacks Lock

March 8, 2021 by CBW Reporter

Researchers at the University of Illinois have discovered a new vulnerability in Intel CPUs that makes them vulnerable to side-channel attacks.

Examining Intel’s CPU ring interconnects, the trio, doctoral student Riccardo Paccagnella, master’s student Licheng Luo, and assistant professor Christopher Fletcher, discovered that the rings can be exploited for malicious purposes.

“It is the first attack to exploit contention on the cross-core interconnect of Intel CPUs,” Paccagnella told The Register, adding that since “the attack does not rely on sharing memory, cache sets, core-private resources or any specific uncore structures,” it can’t be mitigated with the existing defenses for side-channel attacks.

More Intel flaws

The researchers will present their findings later in the year at the USENIX Security 2021 conference.

The trio believe their new side-channel attack vector could leak encryption keys along and were also reportedly able to demonstrate the ability to monitor keystroke timings, which can be used to reconstruct typed passwords. 

The attacks were tested on Intel Coffee Lake and Skylake CPUs, and it isn’t clear whether the attack vector will work on newer Intel Xeon’s. 

For its part, Intel supported the researchers in their endeavor, but isn’t overly worried about their discovery. In fact it has clubbed their new attack vector alongside existing side-channel attacks.

“They treat this class of attacks differently than the class of ‘speculative execution / transient execution attacks’ (like Spectre, Meltdown, etc.). That is, they do not consider traditional side channel attacks as significant value for an attacker and they already published their suggested guidance on how to mitigate them in software,” shares Paccagnella.

Via: The Register

View Source

Filed Under: COMPUTERS

Primary Sidebar

More to See

Telarus’ UCaaS/CCaaS Provider Portfolio Now Includes Simplicity VoIP

[ad_1] Simplicity VoIP brings Netsapiens technology to the Telarus community. Telarus has added Simplicity VoIP, the provider of UCaaS … [Read More...] about Telarus’ UCaaS/CCaaS Provider Portfolio Now Includes Simplicity VoIP

Quantum computing hits the desktop, no cryo-cooling required

[ad_1] Superconducting quantum computers are huge and incredibly finicky machines at this point. They need to be isolated from anything that might … [Read More...] about Quantum computing hits the desktop, no cryo-cooling required

True Palo Alto Networks Exam Questions With Updated PSE-Strata Ideal Quality Of PDF Exam Dumps

[ad_1] Up Grade Your Vision And Skillset with Palo Alto Networks PSE-Strata Exam PDF DumpsAs of these days if we see lots of Palo Alto Networks … [Read More...] about True Palo Alto Networks Exam Questions With Updated PSE-Strata Ideal Quality Of PDF Exam Dumps

Footer

SITE INFORMATION

COMPUTER BUSINESS WORLD NEWS

About/Contact

Privacy Policy

Thank you for visiting our website.

Recent

  • Vytelle Closes Oversubscribed Series A
  • Telarus’ UCaaS/CCaaS Provider Portfolio Now Includes Simplicity VoIP
  • Quantum computing hits the desktop, no cryo-cooling required

Search

Copyright © 2022 Computer Business World