idw – Informationsdienst Wissenschaft

Nachrichten, Termine, Experten

Grafik: idw-Logo
Science Video Project
idw-Abo

idw-News App:

AppStore

Google Play Store



Instanz:
Teilen: 
14.05.2019 19:00

Following on from Meltdown and Spectre: TU Graz researchers discover new security flaws

Barbara Gigler Kommunikation und Marketing
Technische Universität Graz

    ZombieLoad and Store-to-Leak Forwarding impact on the security of Intel computer processors. The patches developed last year are ineffective, so new updates and security solutions will be necessary.

    ZombieLoad and Store-to-Leak Forwarding are the names of the new exploits which have just been announced by TU Graz security researchers Daniel Gruss, Moritz Lipp, Michael Schwarz and an international team. The three computer scientists were together with TU Graz Professor Stefan Mangard part of the team which discovered the serious security flaws Meltdown and Spectre last year.

    ZombieLoad

    ZombieLoad uses a similar approach to Meltdown. In order to enable faster processing, computer systems prepare several tasks in parallel, before discarding the ones that are either not needed or for which the necessary permissions have not been given. Due to the way processors are designed, they always have to pass on data, even if it is not correct. The check for permission only happens once sensitive processing steps, which depend on assumptions made by the computer system, have already been prepared. “In the split second between the command and the check, using this new form of attack we can see the pre-loaded data from other programs,” explains Gruss. In other words, the researchers can read what the computer is currently processing.

    The KAISER patch developed by a team at TU Graz provided a simple solution for Meltdown, which affected the speed of a computer. Coming up with a solution for ZombieLoad attacks could be more difficult, says Gruss: “Every CPU has multiple cores, and each of these cores is also split in two. This means several programs can run simultaneously. We think that one of these two parts of each core has to be disabled.” That would mean a 50% drop in performance. Or in clouds, which are also vulnerable to this method of attack, 50% fewer potential users on the same hardware.
    All processors developed by Intel that were manufactured between 2012 and the beginning of 2018 are affected. More information: https://zombieload.com/zombieload.pdf

    Store-to-leak forwarding

    Store-to-leak forwarding also reads pre-loaded data by exploiting the efficient way in which computer processors function. “The computer assumes that I want to use the data which I have just written to the processor again right away. So it keeps it in the buffer for faster access,” explains Gruss. This functionality can also be used to determine the architecture of the computer processor and find the exact location where the operating system is running. “If I know exactly where the processor is running the operating system, then I can launch targeted attacks against flaws in the operating system.” More information: https://cpu.fail/store-to-leak.pdf

    New updates urgently required

    The researchers immediately reported their discoveries to Intel, which has been working on a solution ever since. “Computer users should install all new updates without delay to ensure that their systems are protected,” recommends Gruss.

    The research was funded by the ERC project Sophia, the project DESSNET and the project ESPRESSO as well as by a donation from the manufacturer Intel.

    Research partners:
    Daniel Gruss, Moritz Lipp, Michael Schwarz, Claudio Canella und Lukas Giner – Graz University of Technology (TU Graz)
    Daniel Moghimi, Worcester Polytechnic Institute
    Jo Van Bulck, imec-DistriNet, KU Leuven
    Julian Stecklina, Cyberus Technology
    Thomas Prescher, Cyberus Technology


    Wissenschaftliche Ansprechpartner:

    Graz University of Technology ( TU Graz)
    Institute of Applied Information Processing and Communications
    Inffeldgasse 16a, 8010 Graz, Austria
    www.tugraz.at

    Daniel GRUSS
    Ass.Prof. Dipl.-Ing. Dr.techn. BSc
    Phone: +43 316 873 5544
    Email: daniel.gruss@iaik.tugraz.at

    Moritz LIPP
    Dipl.-Ing. BSc
    Phone: +43 316 873 5563
    Email: moritz.lipp@.iaik.tugraz.at

    Michael SCHWARZ
    Dipl.-Ing. BSc
    Phone: +43 316 873 5537
    Email: michael.schwarz@.iaik.tugraz.at


    Originalpublikation:

    https://zombieload.com/zombieload.pdf
    https://cpu.fail/store-to-leak.pdf


    Weitere Informationen:

    https://www.tugraz.at/en/tu-graz/services/news-stories/media-service/singleview/...


    Bilder

    Following the discoveries of Meltdown and Spectre, TU Graz researchers Michael Schwarz, Daniel Gruss and Moritz Lipp (from left) have uncovered two serious new security flaws in computer processors.
    Following the discoveries of Meltdown and Spectre, TU Graz researchers Michael Schwarz, Daniel Gruss ...
    Quelle: © Lunghammer - TU Graz


    Merkmale dieser Pressemitteilung:
    Journalisten
    Informationstechnik
    überregional
    Forschungsergebnisse, Forschungsprojekte
    Englisch


     

    Following the discoveries of Meltdown and Spectre, TU Graz researchers Michael Schwarz, Daniel Gruss and Moritz Lipp (from left) have uncovered two serious new security flaws in computer processors.


    Zum Download

    x

    Hilfe

    Die Suche / Erweiterte Suche im idw-Archiv
    Verknüpfungen

    Sie können Suchbegriffe mit und, oder und / oder nicht verknüpfen, z. B. Philo nicht logie.

    Klammern

    Verknüpfungen können Sie mit Klammern voneinander trennen, z. B. (Philo nicht logie) oder (Psycho und logie).

    Wortgruppen

    Zusammenhängende Worte werden als Wortgruppe gesucht, wenn Sie sie in Anführungsstriche setzen, z. B. „Bundesrepublik Deutschland“.

    Auswahlkriterien

    Die Erweiterte Suche können Sie auch nutzen, ohne Suchbegriffe einzugeben. Sie orientiert sich dann an den Kriterien, die Sie ausgewählt haben (z. B. nach dem Land oder dem Sachgebiet).

    Haben Sie in einer Kategorie kein Kriterium ausgewählt, wird die gesamte Kategorie durchsucht (z.B. alle Sachgebiete oder alle Länder).