Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday December 13 2019, @12:44AM   Printer-friendly
from the the-more-you-tighten-your-grip... dept.

Submitted via IRC for Anonymous_Coward

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets

When thieves want to steal treasures surrounded by sensors and alarms, they sometimes resort to cutting the power, disrupting the flow of electricity to those expensive security systems. It turns out that hackers can pull off a similar trick: breaking the security mechanisms of Intel chips by messing with their power supply, and exposing their most sensitive secrets.

Two teams of researchers—one at the University of Birmingham in the UK, TU Graz in Vienna, KU Leuven in Belgium and another at the Technische Universität Darmstadt in Germany and the University of California—have found a new technique that can allow hackers to fiddle with the voltage of Intel chips to cause them to leak information stored using Intel's Secure Guard Extensions feature. Those "secure enclaves" in a device's memory are designed to be impregnable. Intel, which asked the teams to keep their findings under wraps for the last six months, confirmed the findings and pushed out an update to its chip firmware to prevent the attack today.

The technique, which one of the two teams calls Plundervolt, involves planting malicious software on a target computer that temporarily reduces the voltage of the electricity flowing to an Intel chip. That drop in voltage, known as "undervolting," typically allows legitimate users to save power when they don't need maximum performance. (By that same token, you can use the voltage-variance feature to "overclock" a processor for more intensive tasks.) But by momentarily undervolting a processor by 25 or 30 percent, and precisely timing that voltage change, an attacker can cause the chip to make errors in the midst of computations that use secret data. And those errors can reveal information as sensitive as a cryptographic key or biometric data stored in the SGX enclave.

"Writing to memory takes power," says Flavio Garcia, a computer scientist at the University of Birmingham who, along with his colleagues, will present the Plundervolt research at IEEE Security and Privacy next year. "So for an instant, you reduce the CPU voltage to induce a computation fault."

Once the researchers found that they could use voltage changes to induce those faults—a so-called fault injection or "bit flip" that turns a one to a zero in the SGX enclave or vice versa—they showed that they could also exploit them. "If you can flip bits when, for instance, you're doing cryptographic computations—and that's where this gets interesting—you can recover the secret key," Garcia says. In many cases, the researchers explain, changing a single bit of a cryptographic key can make it vastly weaker, so that an attacker can both decipher the data it encrypts and derive the key itself. You can see the impact on an AES encryption key here:

The researchers also showed that they could use those bit flips to make the processor write to an unprotected portion of memory rather than to the secure SGX enclave:

Also reported at: Intel CPU 'Plundervolt' Flaw Spills Secrets Through Voltage Manipulation


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by takyon on Friday December 13 2019, @08:31AM (1 child)

    by takyon (881) <reversethis-{gro ... s} {ta} {noykat}> on Friday December 13 2019, @08:31AM (#931663) Journal

    I hear that "Foreshadow" [wikipedia.org] was the vulnerability that really broke Intel, and that the vulnerabilities have been driving up sales.

    Normally, it would take a long time for AMD to recover market share with Epyc, but that process may have been sped up too.

    AMD might receive more attention when they get more market share, but they get to start from an almost blank slate since they died in the server space.

    Of course, some of that attention might be from Intel or short sellers [anandtech.com].

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Saturday December 14 2019, @08:34PM

    by Anonymous Coward on Saturday December 14 2019, @08:34PM (#932152)

    AMD (and others) have been getting attention from security researchers, but they all seem to have stricter design policies than Intel.