Virtually every modern computer processor was thrown under the bus earlier this year when researchers found a fundamental design weakness in Intel, AMD and ARM chips, making it possible to steal sensitive data from the computer’s memory. The Meltdown and Spectre vulnerabilities — which date back to 1995 — punched holes in the walls that […]
Virtually every modern computer processor was thrown under the bus earlier this year when researchers found a fundamental design weakness in Intel, AMD and ARM chips, making it possible to steal sensitive data from the computer’s memory.
The Meltdown and Spectre vulnerabilities — which date back to 1995 — punched holes in the walls that keeps apps from accessing other parts of the system’s memory that it doesn’t have permission to read. That meant a skilled attacker could figure out where sensitive data was stored, like passwords and encryption keys. While the companies mitigated some of the flaws, they acknowledged that their long term plan would require a core redesign in how their computer processors work.
Now, a team of MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) researchers say they have found a way to prevent a similar range of flaws like Meltdown and Spectre in the future.
When an app needs to store something in memory, it asks the processor where to put it. But searching for that memory is slow, so processors use a trick known as “speculative execution” to run several sets of tasks at the same time while it finds the right memory slot. But attackers can exploit the same technique to allow an app to read parts of the memory that it shouldn’t be allowed to read.
MIT’s CSAIL says their technique would split up memory so that the data not stored in the same place — in what the team calls “secure way partitioning.”
They call it called DAWG — or “Dynamically Allocated Way Guard” — which, admittedly might sound ridiculous, but it’s meant to work as a counterpoint to Intel’s Cache Allocation Technology, or CAT. According to their work, DAWG works similarly to CAT and doesn’t require many changes to the device’s operating system — making it potentially as easy to install on an affected computer as Meltdown’s microcode fix.
According to Vladimir Kiriansky, one of the research paper’s authors, the new technique “establishes clear boundaries for where sharing should and should not happen, so that programs with sensitive information can keep that data reasonably secure.”
Not only could the technology help to protect regular computers, but also also vulnerable cloud infrastructures.
Although DAWG can’t prevent against every speculative attack, the researchers are now working to improve their technology to prevent against more — if not all attacks.
But if their technology is picked up by Intel or any other chip maker, the researchers say techniques like DAWG could “restore our confidence in public cloud infrastructure, and hardware and software co-design will help minimize performance overheads.”