To Fight Spectre-Like Attacks, Intel Suggests a New Kind of Memory – Slashdot | xxxTo Fight Spectre-Like Attacks, Intel Suggests a New Kind of Memory – Slashdot – xxx
菜单

To Fight Spectre-Like Attacks, Intel Suggests a New Kind of Memory – Slashdot

九月 2, 2019 - MorningStar

Become a fan of Slashdot on Facebook

 


Forgot your password?
Close

binspamdupenotthebestofftopicslownewsdaystalestupid freshfunnyinsightfulinterestingmaybe offtopicflamebaittrollredundantoverrated insightfulinterestinginformativefunnyunderrated descriptive typodupeerror

Check out Slashdot on LinkedIn & Minds! | Migrate from GitHub to SourceForge quickly and easily with this tool. Check out all of SourceForge’s improvements.

×

116790196 story

To Fight Spectre-Like Attacks, Intel Suggests a New Kind of Memory - Slashdot To Fight Spectre-Like Attacks, Intel Suggests a New Kind of Memory - Slashdot

To Fight Spectre-Like Attacks, Intel Suggests a New Kind of Memory (zdnet.com) 57

Posted by EditorDavid from the plugging-the-memory-hole dept.
Intel researchers published a paper last week suggesting a new kind of CPU memory to block side-channel attacks like Meltdown and Spectre, according to ZDNet: SAPM — or Speculative-Access Protected Memory — is the work of Intel STORM (STrategic Offensive Research & Mitigations), a team of elite security researchers that Intel assembled since 2017 to work on creating mitigations for all the speculative-execution attacks that have impacted the CPU maker’s products. SAPM is only an idea for the moment, and there are no silicon prototypes. Intel STORM engineers only released “the theory and possible implementation options,” to provide “a ground base for other researchers to improve upon and also for the industry to consider….”

Intel STORM researchers say SAPM will implement protections at the hardware level and will work with both physical and virtual memory addresses. “SAPM can be applied to specific memory ranges, with the attribute that any memory access to such memory type will be instruction-level serialized, meaning that any speculative execution beyond the SAPM-accessing instruction will be stopped pending the successful retirement of this SAPM-accessing instruction,” Intel STORM developers said in their short description of SAPM’s basic principles…

Intel STORM researchers say the second part (backend) of most speculative execution attacks performs the same actions. SAPM was designed to introduce hardware-based protections against the backend part of most attacks. It’s because of this concept that Intel’s research team believes that SAPM will also future-proof the next generations of Intel CPUs against other — currently undiscovered — speculative execution attacks.
“Intel STORM researchers don’t deny that there’s a performance hit,” the article adds. “However, this impact is low and could be mitigated further by dropping other existing protections.”

To Fight Spectre-Like Attacks, Intel Suggests a New Kind of Memory

Comments Filter:

  • I sure hope it’s the return of Rambus!

  • by RotateLeftByte ( 797477 ) writes: on Sunday October 06, 2019 @10:45AM (#59275338)

    and be done with it.

    • Speculative Memory-Access Protection

      But actually it’s going to be called SPA not SPAM or SPAM in the long run. that is you will refer to this as SPA memory. Otherwsie yo’d be saying something as redundant as ATM Machine.

  • how about (Score:5, Interesting)

    by jmccue ( 834797 ) writes: on Sunday October 06, 2019 @10:51AM (#59275362) Homepage

    How about fixing the CPU, I know it is hard work and we all know it will cost real dollars. But large companies would rather do anything rather than spend to fix an issue they caused. God forbid they have to lower the dividen by 10 cents to fix the problem once and for all.

    While you are at in why don’t you allow people to completely disable ME (Intel Management Engine) and we can have a protected system.

    • This is about fixing the CPU, can only be fixed in future processors.

      You do know the ones they made for the last 20+ years can’t be fixed, impossible. Intel chose at that time to ignore the exposed flaws then and everyone forgot.

      • That’s right, and it wasn’t just Intel. It was the whole goddam box. The best computers in the world are leaky. We need a new machine that incorporates what we’ve learned so far.

      • This is about fixing the CPU, can only be fixed in future processors.

        Yes, but current processors can’t support this memory that doesn’t even exist, even if it did exist, so this won’t help with the processors which can’t be fixed. The memory controller is the right place to put this functionality, NOT the memory.

    • Fix the CPU? How do you do that? The attacks rely indirectly on CPU optimizations that keep some memory in the internal cache (indirectly because it tells if a bit is 0 or 1 based on the time it takes the CPU to retrieve some data).

    • Re:how about (Score:4, Interesting)

      by geekmux ( 1040042 ) writes: on Sunday October 06, 2019 @11:40AM (#59275508)

      How about fixing the CPU, I know it is hard work and we all know it will cost real dollars. But large companies would rather do anything rather than spend to fix an issue they caused. God forbid they have to lower the dividen by 10 cents to fix the problem once and for all.

      While you are at in why don’t you allow people to completely disable ME (Intel Management Engine) and we can have a protected system.

      Uh, just to clarify, this isn’t about actually fixing a damn thing other than public perception.

      Why do you think they’re ignoring the Intel Management Engine?

      They’re doing the minimal amount of bullshit work on vaporware in order to appease shareholders. That’s it.

      • They are working on fixing these SE problems in future CPU, they’ve fixed some already.

        They did fix one vulnerability Management Engine had until 2017, in later processors.

        There is firmware fix for the INTEL-SA-00125 management engine vulnerability found in 2018.

    • How about fixing the CPU

      Because there is no fix, and speculative execution isn’t even limited to CPUs. There is one single Speculative Execution but that has been plaguing only Intel CPUs, the other 10-15 that have been discovered since this form of attack became popular (in laboratories anyway), have affected all CPUs, and even some network cards, and the proposed fixes are crippling.

    • How about fixing the CPU, I know it is hard work and we all know it will cost real dollars. But large companies would rather do anything rather than spend to fix an issue they caused. God forbid they have to lower the dividen by 10 cents to fix the problem once and for all.

      The general problem is extremely hard, in a process with shared resources how do you stop a process from inferring something based on consuming those resources. Like if I know when you leave for work and arrive at work, I can infer the route you take by causing a traffic jam and see if that causes you to be late. Now Intel really goofed by installing a blinker that told you whether you had a car in the lane next to you even though you weren’t allowed to use that lane making it much, much easier but fixing t

      • A better idea is to simplify the processors and have more of them, and REALLY limit their intercommunication. This means totally abolishing hyperthreading, and replacing it by have a lot more real processes (at one process/CPU). Also, the only memory that a CPU can modify is it’s own. Messages are passed, but changing the message doesn’t change the original. Etc.

        There are types of problem for which this would not be optimal, but those should be addressed with attached processors, similar to the way GPUs

    • How about fixing the CPU

      To be sure, this is the fix.

      The crux of the issue is that the combination of speculative execution and caching appears to be inherently vulnerable to Spectre-like attacks. With enough effort, it will always be possible to use cache and instruction timings to infer the contents of a piece of memory. At no point is an otherwise hardened CPU doing anything wrong – it’s never directly disclosing the data – but a smart attacker can use the state of things to correctly figure out what’s go

      • Fencing instructions sound like a hassle as you stated from a development perspective. I could easily see lazy developers or greedy corporations cutting corners and not using it when they should.

        That said, I could also see government entities wanting to build a whole new type of speculative execution fencing instruction backdoor…YAY!

    • I think they’ve misnamed the memory though, it should be Speculatively Protected Access Memory.

    • by gtall ( 79522 ) writes:

      Yah, I’m disappointed it didn’t mention “synergy” and “leveraging our lead in technology” and “being forward looking into the future”.

  • Hem, AMD does that already.

    • This isn’t encrypted memory. It’s marking certain memory addresses as sensitive, so that the processor doesn’t speculatively execute against them.

      Encrypted memory would just mean you have to steal the key first, which is very doable with Spectre. And in fact the slow rate for Spectre means that stealing keys is one of the best uses for it.

      Otherwise, encrypted memory is fantastic; but it doesn’t solve this specific problem.

  • Let’s design a RAM that only Intel CPUs will be able to use

      • in anticonspiracy theories.
        Like “The NSA leaks never happened. There is no PRISM or XKeyScore. They are the good guys.” or “We live in a democracy. The politicians represent us. They are not evil. Just stupid.”.
        Everything to keep sleeping until it is too late, and then some.

        Conspiracy theories take a non-conformist nutjob.
        Most people are conformist nutnobs. The accepted kind of nutnob.

    • by gtall ( 79522 ) writes:

      Why, there’s so much low hanging fruit dangling off that bozo to go after first.

  • “this impact is low and could be mitigated further by dropping other existing protections”

    That’s kinda exactly what I don’t want. Give me security and performance. Maybe start teaching these fucktards how to actually secure the first three layers of the OSI model so the other fuckton of useless layers are unnecessary.

      • So you are saying it takes a car mechanic to recognize that the car door lock is missing? (Maybe for you it does.)

        Or that if I can tell such a blatantly obvious fact, then I should also be able to fix it, to get your majesty’s nod on being allowed to mention that?

        I think you’re just very good at walking on your hands and pretending that is your mouth talking.

        • Car mechanics say stupid, ignorant things about the engineers who design the cars every day of the week. And they’re full of shit and didn’t know what they were talking about 100% of the time, too.

  • Intel spent 30 years beating AMD by hook or by crook in the market, and it did this largely by selecting an overwhelmingly risky and underhanded technology called Hyperthreading that let intel claim it always had more cores than AMD. These cores never existed on the die, only in the sales and marketing department, so it saved intel boatloads of cash and let them play fast and loose with an implementation that was known two decades ago to have serious risks and concerns.

    now these issues are piling up, and intel cant bail water fast enough to keep Core(TM) from sinking. Their first round of patches to the Linux kernel affected performance so miserably that the module was submitted by the developer from intel as ‘disabled by default.’ so lscpu could always report the mitigation while sparing the customer (and intel) a 30-40% performance hit. Then ZombieLoad came out and despite the bug being reported rightly by security researchers as High or Critical, Intel hand waved it down to a medium vulnerability despite its proven ability to extract passwords from /etc/shadow.

    Now Intel doesnt even want to deal with their shitty chips anymore and instead wants memory manufacturers to somehow feel generous enough to enact protections that would be pointless for the current market leader (AMD) and also only save intel the time and expense of a bare-metal redesign of whats largely become a silicon liability.

    • I’m not sure why you think this is an Intel vs AMD issue given that AMD is vulnerable to all the same speculative execution attacks save for a single example (Meltdown).

      • It is not. Or rather exploiting these vulnerabilities on AMD is so hard it is likely infeasible in practice. It is already very hard on Intel, but not infeasible there. You should read up on things, you seem to be missing a rather important piece of the picture.

    • Intel spent 30 years beating AMD by hook or by crook in the market, and it did this largely by selecting an overwhelmingly risky and underhanded technology called Hyperthreading that let intel claim it always had more cores than AMD.

      I am highly confused by this statement. Everyone I talk to was always very aware that 2 hyperthreads is quite different from two cores. Hyperthreading is just Intel’s flavor of Simultaneous Multi Threading.
      Also, AMD is also using SMT. It is a corner stone of modern processor design. Keeping more execution contexts than available ALUs is a very common strategy that you find SPARC, in POWER, and in x86 chips. Actually that even how GPUs are working, you keep more context on-die than you have execution resourc

    • Intel spent 30 years beating AMD by hook or by crook in the market, and it did this largely by selecting an overwhelmingly risky and underhanded technology called Hyperthreading that let intel claim it always had more cores than AMD.

      This is almost completely wrong. this is the only part that’s correct:

      it did this largely by selecting an overwhelmingly risky and underhanded technology

      This part is true. But the overwhelmingly risky and underhanded technology was skipping checks to see whether they were supposed to access memory until after they accessed it. That’s the reason why Intel is vulnerable to MELTDOWN and AMD isn’t, and why Intel is more vulnerable to SPECTRE than AMD.

      Intel never advertised HT as increasing core count, only con

  • by logicnazi ( 169418 ) writes: <gerdes@nOSpaM.invariant.org> on Sunday October 06, 2019 @12:01PM (#59275574) Homepage

    Câ(TM)mon. It obviously should be Speculative Protected Access Memory (SPAM) not Speculative-access protected memory.

    • God damnt what happened to my câ(TM)mon ?

      • God damnt what happened to my câ(TM)mon ?

        You posted from your iPhone with defaults, because you are a god damn inconsiderate prick that doesnt care that Apples keyboard by default doesnt emit the real quote character, but instead emits fancy cartoon glyphs designed for infantiles that dont care that their shit aint standard and is broken, only that it looks good.

        • There’s nothing nonstandard about the character U+2018. It’s certainly not ascii, but that’s not the same thing as saying it’s not standard.

          If slashdot insists on blocking non-ascii utf8, I think that the submit button should invoke a quick scan on the subject and body of the post to ensure there are no non-ascii characters, and if there is, it should instead go to a preview message page and inform the user that non-ascii is detected, requiring the user to click submit again on the unmodified text to tr

  • Like AMD did. Without any special memory.

    • AMD is vulnerable to Spectre just not the Meltdown variant.

    • The same AMD that is vulnerable to 14 out of the 15 speculative execution vulnerabilities that have been published to date?

      • No. The AMD where it is hard enough to attack these vulnerabilities to make them infeasible in practice. Unlike on Intel.

  • … build stuff without the need to use a goddam chisel to fine-tune it.

    “However, this impact is low and could be mitigated further by dropping other existing protections.”

  • Which kind?
    I forgot.

  • Intel seems to get really desperate to draw attention away from their massive screw-up.

  • Not all computer uses are vulnerable to such attacks? For instance, who is going to care if they are playing a single player game off-line when it would be nice to have the CPU working to full capacity. Perhaps a hardware switch….

  • You can also slather yourself with snake-oil to mitigate Spectre. Or you can buy Intel’s new pre-slathered RAM chips. The choice is yours. Just so long as you buy some snake-oil.

There may be more comments in this discussion. Without JavaScript enabled, you might want to turn on Classic Discussion System in your preferences instead.

Slashdot Top Deals

There are new messages.

Close

Close

Slashdot

Working...


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51