Researcher set to demo attack on Intel chips
Analyst: 'Serious' Kaspersky claim will entice hackers to find, exploit bugs in processors
Computerworld - The author of several security books is slated to demonstrate how he could take advantage of flaws in Intel Corp.'s chips to launch a remote attack against a computer -- regardless of what software platform it's running.
He also charged that such CPU bugs actually have damaged hard drives without users' knowledge.
"Although CPU bugs are not something new in the security industry, nobody has come out with any proof-of-concept exploits," wrote Kaspersky. "It is just a matter of time before we start seeing these sort of attacks used in more devastating ways over the Internet. Intel has provided work-arounds to major BIOS vendors for some of these bugs, but who knows which vendor actually uses them? End- users are in the dark as to how to check if they are secure or not. Intel doesn't provide any test program for this, and the worst thing is [that] some bugs are still not fixed. In other words, Intel has no work-around for it."
George Alfs, a spokesman for Intel, said he has not yet seen Kaspersky's research, nor has he spoken to him about it.
"We have evaluation teams always looking at issues. We'll certainly take a look at this one," said Alfs. "All chips have errata, and there could be an issue that needs to be checked. Possibly. We'd have to investigate his paper."
Alfs said the first step for Intel will be to get a copy of Kaspersky's paper and then discuss his research with him. Then Intel would conduct its own tests. He would not say whether Kaspersky contacted Intel before going public with his findings.
In his presentation summary, Kaspersky, who does not work for Kaspersky Lab, noted that some of the flaws that he will show off are exploitable via common instruction sequences and by knowing the mechanics behind certain JIT Java compilers.
"If his allegations are true, then computers from personal computers to servers, are at risk," said Dan Olds, an analyst at Gabriel Consulting Group Inc. "These allegations are serious and, if true, certainly a cause for concern. Just the fact that this is being widely publicized will act as an enticement for hackers to exploit the alleged weaknesses in the processors. That said, I believe that the author may be entering into the land of hyperbole when he says that these bugs can be exploited regardless of operating system or other security measures. That certainly needs to be proven."
Read more about Hardware in Computerworld's Hardware Topic Center.
- A Reference Architecture for the Internet of Things The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- How to Reduce Hardware & Infrastructure Costs Through Data In this paper, we take a look at how organizations are revisiting their network and server architecture in a bid to address the...
- Software Build Acceleration, Analytics and Build Clouds Discover how to dramatically speed up software builds by automatically distributing build jobs over scalable resource clouds and multi-core desktops, with potential savings...
- Printer Installer: Eliminating Print Servers Printer Installer is an on-premise web application that enables you to centrally manage and deploy Windows shared or direct iP printers.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Hardware White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!