New Spectre derivative bug haunts Intel processors

 

Researchers have discovered how to use the Spectre design flaw to break into the SGX secure environment of an Intel CPU to steal information. A fix is coming March 16.

Intel just can’t catch a break these days. Researchers at Ohio State University have found a way to use the Spectre design flaw to break into the SGX secure environment of an Intel CPU to steal information.

SGX stands for Software Guard eXtensions. It was first introduced in 2014 and is a mechanism that allows applications to put a ring around sections of memory that blocks other programs, the operating system, or even a hypervisor from accessing it.

These walled-off areas are called enclaves, and they are typically used to run things such as DRM code without allowing anyone, even privileged malware, to spy on the decryption keys. It can also allow sensitive code to be run on an otherwise untrusted or unsecured machine.

Prease to read more here:

https://www.networkworld.com/article/3261087/cpu-processors/...

--
Never argue with a pig. It makes you look foolish and it anoys the hell out of the pig!

.

The hackers are always one step ahead, it seems.

--
nüvi 3790T | Those who make peaceful revolution impossible, will make violent revolution inevitable ~ JFK

to me it's like gene splicing

I know it can be done and it has been done, but when I try to understand what the heck they are talking about, my eyes glaze over and I start drooling and I become almost catatonic.... question

--
Striving to make the NYC Metro area project the best.