Researcher set to demo attack on Intel chips
Analyst: 'Serious' Kaspersky claim will entice hackers to find, exploit bugs in processors
Computerworld - The author of several security books is slated to demonstrate how he could take advantage of flaws in Intel Corp.'s chips to launch a remote attack against a computer -- regardless of what software platform it's running.
He also charged that such CPU bugs actually have damaged hard drives without users' knowledge.
"Although CPU bugs are not something new in the security industry, nobody has come out with any proof-of-concept exploits," wrote Kaspersky. "It is just a matter of time before we start seeing these sort of attacks used in more devastating ways over the Internet. Intel has provided work-arounds to major BIOS vendors for some of these bugs, but who knows which vendor actually uses them? End- users are in the dark as to how to check if they are secure or not. Intel doesn't provide any test program for this, and the worst thing is [that] some bugs are still not fixed. In other words, Intel has no work-around for it."
George Alfs, a spokesman for Intel, said he has not yet seen Kaspersky's research, nor has he spoken to him about it.
"We have evaluation teams always looking at issues. We'll certainly take a look at this one," said Alfs. "All chips have errata, and there could be an issue that needs to be checked. Possibly. We'd have to investigate his paper."
Alfs said the first step for Intel will be to get a copy of Kaspersky's paper and then discuss his research with him. Then Intel would conduct its own tests. He would not say whether Kaspersky contacted Intel before going public with his findings.
In his presentation summary, Kaspersky, who does not work for Kaspersky Lab, noted that some of the flaws that he will show off are exploitable via common instruction sequences and by knowing the mechanics behind certain JIT Java compilers.
"If his allegations are true, then computers from personal computers to servers, are at risk," said Dan Olds, an analyst at Gabriel Consulting Group Inc. "These allegations are serious and, if true, certainly a cause for concern. Just the fact that this is being widely publicized will act as an enticement for hackers to exploit the alleged weaknesses in the processors. That said, I believe that the author may be entering into the land of hyperbole when he says that these bugs can be exploited regardless of operating system or other security measures. That certainly needs to be proven."
Read more about Hardware in Computerworld's Hardware Topic Center.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Redefine Your IT Operations: Remote Office IT Has Never Been Simpler Join us to see why PC Pro named Dell PowerEdge VRTX the "2013 Server of the Year." PowerEdge VRTX may be just what...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Hardware White Papers | Webcasts