Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Fractal Design Pop Air RGB Black TG review
Palit GeForce GTX 1630 4GB Dual review
FSP Dagger Pro (850W PSU) review
Razer Leviathan V2 gaming soundbar review
Guru3D NVMe Thermal Test - the heatsink vs. performance
EnGenius ECW220S 2x2 Cloud Access Point review
Alphacool Eisbaer Aurora HPE 360 LCS cooler review
Noctua NH-D12L CPU Cooler Review
Silicon Power XPOWER XS70 1TB NVMe SSD Review
Hyte Y60 chassis review

New Downloads
Intel ARC graphics Driver Download Version: 30.0.101.1743
AMD Radeon Software Adrenalin 22.6.1 WHQL driver download
GeForce 516.59 WHQL driver download
Media Player Classic - Home Cinema v1.9.22 Download
AMD Chipset Drivers Download v4.06.10.651
CrystalDiskInfo 8.17 Download
AMD Radeon Software Adrenalin 22.6.1 Windows 7 driver download
ReShade download v5.2.2
HWiNFO Download v7.26
7-Zip v22.00 Download


New Forum Topics
Is it a good time to get a 3060ti or wait? [3rd-Party Driver] Amernime Zone Radeon Insight 22.5.1 WHQL Driver Pack (Released) AMD is planning to release Ryzen 7000 CPUs in September AMD Radeon Software - UWP Collapse of crypto mining industry leads to auctioning off of thousands of graphics cards AMD VRR issue LG OLED CX NVIDIA GeForce 516.59 WHQL driver download & Discussion According to Asus and Gigabyte, motherboard sales will fall by 25% this year. Free to grab: three games at Epic Game Store When is "Downscaling" worth it? (DLDSR, etc)




Guru3D.com » News » Researchers Discover new Intel processor Vulnerability - the BranchScope Attack

Researchers Discover new Intel processor Vulnerability - the BranchScope Attack

by Hilbert Hagedoorn on: 03/28/2018 01:58 PM | source: | 48 comment(s)
Researchers Discover new Intel processor Vulnerability - the BranchScope Attack

A new Vulnerability has been discovered on Intel processors by researchers. The security attack uses the speculative execution features of modern processors to leak sensitive information and undermine the security boundaries that operating systems and software erect to protect important data.

The new attack, called BranchScope, has been identified and demonstrated by a team of researchers from the College of William & Mary, University of California Riverside, Carnegie Mellon University in Qatar, and Binghamton University, reports securityweek:

Similar to Meltdown and Spectre, BranchScope can be exploited by an attacker to obtain potentially sensitive information they normally would not be able to access directly. The attacker needs to have access to the targeted system and they must be able to execute arbitrary code. Researchers believe the requirements for such an attack are realistic, making it a serious threat to modern computers, “on par with other side-channel attacks.” The BranchScope attack has been demonstrated on devices with three types of Intel i5 and i7 CPUs based on Skylake, Haswell and Sandy Bridge microarchitectures. Experts showed that the attack works even if the targeted application is running inside of an Intel SGX enclave. Intel SGX, or Software Guard Extensions, is a hardware-based isolated execution system designed to prevent code and data from getting leaked or modified. BranchScope is similar to Spectre as they both target the directional branch predictors. Branch prediction units (BPUs) are used to improve the performance of pipelined processors by guessing the execution path of branch instructions. The problem is that when two processes are executed on the same physical CPU core, they share a BPU, potentially allowing a malicious process to manipulate the direction of a branch instruction executed by the targeted application.

 

 

The BPU has two main  components – a branch target buffer (BTB) and a directional predictor – and manipulating either one of them can be used to obtain potentially sensitive data from the memory. Intel recently published a video providing a high level explanation of how these attacks work. Researchers showed on several occasions in the past how BTB manipulation can be used for attacks, but BranchScope involves manipulation of branch predictors. “BranchScope is the first fine-grained attack on the directional branch predictor, expanding our understanding of the side channel vulnerability of the branch prediction unit,” the researchers explained in their paper.

The researchers who identified the BranchScope attack method have proposed a series of countermeasures that include both software- and hardware-based solutions. Dmitry Evtyushkin, one of the people involved in this research, told SecurityWeek that while they have not been tested, the microcode updates released by Intel in response to Meltdown and Spectre might only fix the BTB vector, which means BranchScope attacks could still be possible. However, Intel told the researchers that software guidance for mitigating Spectre Variant 1 could be effective against BranchScope attacks as well. “We have been working with these researchers and we have determined the method they describe is similar to previously known side channel exploits,” Intel said in an emailed statement. “We anticipate that existing software mitigations for previously known side channel exploits, such as the use of side channel resistant cryptography, will be similarly effective against the method described in this paper. We believe close partnership with the research community is one of the best ways to protect customers and their data, and we are appreciative of the work from these researchers.”

BranchScope is not the only CPU side-channel attack method uncovered following the disclosure of Meltdown and Spectre. One of them, dubbed SgxPectre, shows how Spectre can be leveraged to defeat SGX.

Researchers have also demonstrated new variants of the Meltdown and Spectre attacks, which they have named MeltdownPrime and SpectrePrime.

Intel has released the following statement:

 We have been working with these researchers and we have determined the method they describe is similar to previously known side channel exploits. We anticipate that existing software mitigations for previously known side channel exploits, such as the use of side channel resistant cryptography, will be similarly effective against the method described in this paper. We believe close partnership with the research community is one of the best ways to protect customers and their data, and we are appreciative of the work from these researchers.



Researchers Discover new Intel processor Vulnerability - the BranchScope Attack




« Guru3D PC Buyers Guide Spring Edition 2018 · Researchers Discover new Intel processor Vulnerability - the BranchScope Attack · ASRock Phantom Gaming Graphics Cards Leak - Includes Entire RX 500 line »

Related Stories

Intel processors will get hardware fix for Spectre and Meltdown this year - 01/26/2018 09:58 AM
In a discussion on its Earnings Call, Intel mentions it will release processors that are not susceptible to the Spectre and Meltdown vulnerabilities. The news reaches us today through Intel director...

New Hardware Vulnerability Found in Intel Processors - 01/03/2018 09:04 AM
The details are still very scarce, but a new and potentially huge vulnerability was discovered with pretty much all Intel processors. The good news, it can be fixed, the bad news is that certain workl...

9th Generation Intel Processors Will Get Octa Core i7 - 11/27/2017 05:34 PM
In what is a pretty difficult to translate article, Asia based HKEPC claims to have spoken with motherboard manufacturers, and discovered that Intel's upcoming 9th generation processors will again se...

Cashback action for motherboards and Intel procs at Gigabyte - 10/17/2017 03:35 PM
Gigabyte announced a new cashback campaign that actually might be worthwhile looking into. When purchasing a selected Z270 motherboard, users can get a maximum of 85 Euro return, depending on the com...

Corsair is ready for 7th Generation Intel Products - 01/03/2017 04:19 PM
Corsair announced its readiness for the new 7th Generation Intel Core processors and Intel 200 series motherboards, paving the way for a new generation of performance PCs. ...


10 pages « < 4 5 6 7 > »


jaggerwild
Senior Member



Posts: 848
Joined: 2005-11-18

#5532923 Posted on: 03/29/2018 03:51 AM
OK, so this effects everybody or only VM users? Yeah, Id like the choice to wait on an update to make sure as well. Rather then spending extra time re installing an OS then patching it 15 times.

tensai28
Senior Member



Posts: 1458
Joined: 2013-10-31

#5532934 Posted on: 03/29/2018 05:04 AM
I still haven't installed the bios update for the last vulnerability and haven't been hacked until now (nor has anyone). I'm not gonna be a sucker and lose performance over nothing. Same goes with this if it hurts performance in any way.

fantaskarsef
Senior Member



Posts: 13104
Joined: 2014-07-21

#5532952 Posted on: 03/29/2018 07:43 AM
Again? I still haven't installed Spectre patches...

anticupidon
Senior Member



Posts: 6781
Joined: 2008-03-06

#5532956 Posted on: 03/29/2018 08:05 AM
another one?
what's with all those vulnerabilities popping up lately?

NaturalViolence
Member



Posts: 80
Joined: 2009-10-01

#5533050 Posted on: 03/29/2018 01:39 PM
No worries, we will get yet another patch followed by another leak etc etc.

And at the end of the day with all 4792874525 patches applied our CPUs will perform like a Pentium 3.

You're making a mountain out of a mole hill. There has been one patch so far (per OS), it only effects the performance of VM software, and even then the performance hit is minimal. And to top it off Intel is implying here that the existing workaround will work with this exploit too.

10 pages « < 4 5 6 7 > »


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2022