Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » New Specter-style ‘Pathfinder’ attack targets Intel CPUs, leaks encryption keys and data
    Cyber Security

    New Specter-style ‘Pathfinder’ attack targets Intel CPUs, leaks encryption keys and data

    techempireBy techempire3 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMay 8, 2024Editorial DepartmentData encryption/hardware security

    encryption key

    Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that can be used to launch key recovery attacks against the Advanced Encryption Standard (AES) algorithm.

    These technologies are collectively referred to as Pathfinder It is composed of scholars from the University of California, San Diego, Purdue University, the University of North Carolina at Chapel Hill, Georgia Institute of Technology, and Google.

    Hosein Yavarzadeh, the paper’s lead author, said in a statement: “Pathfinder allows an attacker to read and manipulate key components of the branch predictor, thereby enabling two main types of attacks: reconstructing program control flow history and launching high-resolution Specter attack.

    Internet security

    “This includes extracting secret images from libraries such as libjpeg and recovering encryption keys from AES through intermediate value extraction.”

    Specter is the name of a class of side-channel attacks that exploit branch prediction and speculative execution on modern CPUs to read privileged data in memory and thereby bypass isolation protections between applications.

    The latest attack method targets a feature in the branch predictor called the Path History Register (PHR), which keeps a record of the last branch taken, to induce branch misprediction and cause the victim program to execute unintended code paths , thus inadvertently exposing its confidential information.

    Specifically, it introduces new primitives that can manipulate the PHR and the Prediction History Table (PHT) within the Conditional Branch Predictor (CBR) to leak historical execution data and ultimately trigger Specter-style vulnerabilities.

    In a set of demonstrations outlined in the study, we found that this method can effectively extract secret AES encryption keys and reveal secret images during processing of the widely used libjpeg image library.

    Internet security

    Following responsible disclosure in November 2023, Intel said in an announcement last month that Pathfinder is built on Specter v1 attacks and that previously deployed mitigations for Specter v1 and traditional side channels can mitigate reported attacks. loopholes. There is no evidence that it affects AMD CPUs.

    “[This research] Shows that PHR is prone to leaks, reveals data not available through PHT (ordered results of duplicate branches, global ordering of all branch results), exposes more branch code as a potential attack surface, and cannot be mitigated (clear, use obfuscation for the techniques proposed by PHT),” the researchers said.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.