How Meldown and Spectre affect the modern processors?
Security remains a major concern for
organizations. The recent vulnerabilities Meltdown and Spectre have put
organizations at considerable risk. Meltdown and Spectre leak the confidential
information stored on your devices. Modern processors and cloud are vulnerable
to Meltdown and Spectre, which forces system architects to redesign the
processors. Though these vulnerabilities have some common characteristics, they
are distinct. Meltdown breaks the isolation between the user memory &
kernel and allows to read the unprivileged data stored in the cache. On the
contrary, Spectre breaks the isolation between the processes. It is essential
to know how these vulnerabilities exploit your processors. Let’s see.
Demystifying
the security breaches
Modern processors are designed to provide
quick outputs using a technique, Speculative Execution. It stores all of your
operational instructions (Inputs) in the cache memory to provide quick access. But
these data are not secure, and hackers can easily steal these data.
Cache:
The cache memory stores the copy of your
instructions (inputs) to provide quick access to data. The instructions are the
operations performed earlier.
For example, you visit a website for the
first time. It takes time to load the logo, images on the page, etc. The next
time you are visiting the same website, but it loads within seconds. What happens is the browser cache stores the
copy of the website logo and the images on the local computer and fetches the
data quickly.
Speculative
Execution: The name suggests that the results
executed based on the guesswork.
For example, a user has visited a website
which has multiple language options. But he customizes it with his preferred
language, English. The user revisits the same website after a few days. Now the
website displays in the English language, which means the website understands
the preference of the user and displays according to it. This mechanism of
providing faster results based on the user activities is Speculative Execution.
Side
channel attack: It is more like a trial and error.
The hackers will look for the secret value stored in the cache memory. It might
be your password or other business-critical data.
Imagine, the password is HELLO.
The hacker types A, the system looks for
the value in the cache. If not so, then it will check with the main memory
which takes a lot of time.
The hacker types B, the system will undergo
the same process and reject the value if it is not available in the cache.
Eventually the hacker types H, the value
stored in the cache. Therefore, it takes minimum time.
The hacker will note the time difference.
It becomes clear the value H is in the cache. This mechanism of stealing data
is Side Channel Attack.
Building
a robust defense
Stay safer by practicing the following
methods
- · Make sure your patches are up-to-date
- · Turn on the chrome site isolation to protect your browser
- · Install UEFI (Unified Extensible Firmware Interface) and BIOS (Basic Input/Output System) update manually from your PC manufacturer's website
- · Use Microsoft’s Powershell script to check your system is protected or not
To know more about Microsoft Powershell Script, check this site: http://ow.ly/JhIc30iUuDq
Saravana kumar. S
Assistant Program Manager - IMS
Fourth Dimension Technologies