Ex-Intel security expert: This new Spectre attack can even reveal firmware secrets
A mio avviso conferma il fatto che non ci può essere sicurezza nazionale senza "indipendenza" e controllo della industria dei processori e dei semiconduttori, cosa che l’Europa ha dismesso e obiettivo che non è nemmeno analizzato, e che la Cina ha messo come priorità per il 2025 per sganciarsi dal predominio USA ricordo che ARM è diventata giapponese, tutte le altre aziende di microprocessori sono USA o , secondariamente, coreane o cinesi e le foundry significative in USA, Taiwan e parte Cina g https://www.zdnet.com/article/ex-intel-security-expert-this-new-spectre-atta... [https://zdnet1.cbsistatic.com/hub/i/r/2018/05/18/05a88543-c7e5-4866-b7b1-ce65c6b7ae90/thumbnail/770x578/6bce421222b0c7a3538b20e43bb35fd7/59cbce0de4b0fe6fc5655fcd-1280x7201sep272017214758poster.jpg]<https://www.zdnet.com/article/ex-intel-security-expert-this-new-spectre-attack-can-even-reveal-firmware-secrets/> Ex-Intel security expert: This new Spectre attack can even reveal firmware secrets | ZDNet<https://www.zdnet.com/article/ex-intel-security-expert-this-new-spectre-atta...> www.zdnet.com A new variant of Spectre can expose the contents of memory that normally can't be accessed by the OS kernel. Ex-Intel security expert: This new Spectre attack can even reveal firmware secrets A new variant of Spectre can expose the contents of memory that normally can't be accessed by the OS kernel. By Liam Tung<https://www.zdnet.com/meet-the-team/eu/liam-tung/> | May 18, 2018 -- 12:55 GMT (13:55 BST) | Topic: Security<https://www.zdnet.com/topic/security/> Yuriy Bulygin, the former head of Intel's advanced threat team, has published research showing that the Spectre CPU flaws can be used to break into the highly privileged CPU mode on Intel x86 systems known as System Management Mode (SMM). Spectre and Meltdown vulnerabilities<https://www.zdnet.com/article/security-flaws-affect-every-intel-chip-since-1...> enable software attacks using CPU design flaws common to Intel, AMD, and Arm chips to access secrets stored in memory. Bulygin, who has launched security firm Eclypsium, has modified Spectre variant 1 with kernel privileges to attack a host system's firmware and expose code in SMM, a secure portion of BIOS or UEFI firmware. SMM resides in SMRAM, a protected region of physical memory that should only be accessible by BIOS firmware and not the operating system kernel, hypervisors or security software. SMM handles especially disruptive interrupts and is accessible through the SMM runtime of the firmware, knows as System Management Interrupt (SMI) handlers. As a former Intel researcher explained<http://web.cecs.pdx.edu/~karavan/research/SMM_IISWC_preprint.pdf> in a 2013 paper, when an SMI event occurs, say, due to thermal throttling or system health checks, all the CPU's cores enter SMM or system management mode. "Because SMM generally has privileged access to physical memory, including memory isolated from operating systems, our research demonstrates that Spectre-based attacks can reveal other secrets in memory (eg, hypervisor, operating system, or application)," Bulygin explains<https://blog.eclypsium.com/2018/05/17/system-management-mode-speculative-exe...>. To expose code in SMM, Bulygin modified a publicly available proof-of-concept Spectre 1 exploit running with kernel-level privileges to bypass Intel's System Management Range Register (SMRR), a set or range registers that protect SMM memory. "These enhanced Spectre attacks allow an unprivileged attacker to read the contents of memory, including memory that should be protected by the range registers, such as SMM memory," he notes. "This can expose SMM code and data that was intended to be confidential, revealing other SMM vulnerabilities as well as secrets stored in SMM. Additionally, since we demonstrate that the speculative memory access occurs from the context of SMM, this could be used to reveal other secrets in memory as well."
2018-05-22 11:34 GMT+02:00 gabriele elia <gabriele.elia@live.com>
non ci può essere sicurezza nazionale senza "indipendenza" e controllo della industria dei processori e dei semiconduttori
Non ci può essere sicurezza informatica. Nazionale, aziendale, familiare o personale. Ma non è solo un problema hardware. Qualche tempo fa ho chiesto chi risponde e sotto quale sistema giuridico di un reato compiuto da un javascript eseguito da un pc in Italia ma ricevuto da un host (o da un proxy) in Cina, in Russia o negli Stati Uniti. La risposta più esauriente l'ha fornita Guido Noto La Diega Come punto generale, il diritto regole le persone, non le tecnologie. Per
il resto *l'applicazione extraterritoriale del diritto è spesso problematica *
In termini informatici traduco "Diritto + Internet = Undefined Behaviour". Il panico che mi raccontano i miei amici dagli stati uniti per il GDPR e le manovre intraprese da alcune aziende per spostare petabyte di dati dai server europei, sono molto molto indicative. Dunque tutti gli stack software mainstream che conosco (Windows, iOS, Linux, BSD, Android...) sono strutturalmente insicuri (pur se in modi diversi). Il fatto che lo sia anche l'hardware non peggiora la situazione poi così tanto. Per affrontare il problema bisogna mettere profondamente in discussione lo status quo. A livello tecnologico e politico, ancor prima che economico e legale. Con la certezza di scontentare TUTTI gli operatori del settore. In pratica, siamo spacciati. Giacomo
participants (2)
-
gabriele elia -
Giacomo Tesio