Intel developing security 'game-changer'
Intel CTO says new technology will stop zero-day attacks in their tracks
Computerworld - Intel's chief technology officer says the chip maker is developing a technology that will be a security game changer.
Justin Rattner told Computerworld on Tuesday that scientists at Intel are working on security technology that will stop all zero-day attacks. And, while he would give few details about it, he said he hopes the new technology will be ready to be released this year.
"I think we have some real breakthrough ideas about changing the game in terms of malware," Rattner said. "We're going to see a quantum jump in the ability of future devices, be them PCs or phones or tablets or smart TVs, to defend themselves against attacks."
He noted that the technology won't be signature-based, like so much security is today. Signature-based malware detection is based on searching for known patterns within malicious code. The problem, though, is that zero-day, or brand-new, malware attacks are often successful because they have no known signatures to guard against.
Intel is working around this problem by not depending on signatures.
And the technology will be hardware based, though it's still unclear if it will have a software component.
"Right now, anti-malware depends on signatures, so if you haven't seen the attack before, it goes right past you unnoticed," said Rattner, who called the technology "radically different".
"We've found a new approach that stops the most virulent attacks. It will stop zero-day scenarios. Even if we've never seen it, we can stop it dead in its tracks," he said.
Dan Olds, an analyst with The Gabriel Consulting Group, said if this technology works as Rattner says it will, it could be a major advance for computer security.
"If Intel has hardware technology that can reliably stop zero-day attacks, that would be a huge win in the war against malware," Olds said. "The key is that it's reliable. It has to have the ability to discern legit software from malware. But if they can pull this off, it would give them quite a competitive advantage vs. AMD."
And Olds noted that technology that takes advantage of hardware could be interesting.
"The best security is a combination of hardware and software," he said. "Hardware security can be stronger and faster in some situations, but isn't as flexible as software-only mechanisms. The big change here is that it sounds like Intel is pulling security functions into the chip or the chipset."
Rattner said Intel researchers were working on the new security technology before the company moved to buy security software maker McAfee. However, he said that doesn't mean that McAfee might not somehow be involved.
With that $7.68 billion deal, Intel will become more than just a chip maker. It will become a security company, as well.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
- Intel confirms using ARM-based chip core in smartwatch it demoed at CES
- You'll want a PC with Intel's new chip for the battery life alone
- Desktop chips zip past 4GHz; next stop 5GHz?
- After a tough year, Intel and HP push ahead on Itanium
- Dell testing 64-bit ARM server with AppliedMicro chip
- Physicist says Moore's Law is 'collapsing'
- Intel's Ivy Bridge chips raise the bar for rivals
- Intel ready to take on tablet chips
- AMD execs tout firm's tablet plans
- AMD moves away from Intel rivalry, rethinks course
Read more about Processors in Computerworld's Processors Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Processors White Papers | Webcasts