{"id":212546,"date":"2020-03-12T10:54:15","date_gmt":"2020-03-12T09:54:15","guid":{"rendered":"https:\/\/innovationorigins.com\/?p=212546"},"modified":"2020-03-12T10:54:15","modified_gmt":"2020-03-12T09:54:15","slug":"another-serious-security-vulnerability-in-computer-processors-discovered","status":"publish","type":"post","link":"https:\/\/ioplus.nl\/archive\/en\/another-serious-security-vulnerability-in-computer-processors-discovered\/","title":{"rendered":"Another serious security vulnerability in computer processors discovered"},"content":{"rendered":"<p>An international research team has once again discovered a serious security vulnerability in computer processors: <em>Load Value Injection.<\/em>\u00a0The vulnerability enables a new type of attack: Not only can sensitive data and keys be stolen, but also attacker data can be injected.<\/p>\n<p><em>Load Value Injection<\/em> follows on from a series of vulnerabilities that make the architecture of computer processors vulnerable to attack. The computer processors of the manufacturer <a href=\"https:\/\/www.intel.de\/content\/www\/de\/de\/homepage.html\">Intel<\/a> were particularly affected. The vulnerabilities were discovered by various international research teams who made them public under the names <em>Spectre, Meltdown, Foreshadow, ZombieLoad<\/em> and <em>Plundervolt<\/em>.<\/p>\n<h3>Security hole allows the injection of false data<\/h3>\n<p>Behind the discovery of the new Load Value Injection vulnerability is an international team, in which Daniel Gruss, Michael Schwarz and Moritz Lipp from the <a href=\"https:\/\/www.iaik.tugraz.at\/\">Institute for Applied Information Processing and Communication Technology<\/a> at <a href=\"https:\/\/www.tugraz.at\/home\/\">Graz University of Technology<\/a>\u00a0are central. This is relevant because the Graz researchers were already involved in the discovery of Meltdown, a vulnerability similar to Load Value Injection, in 2018.<\/p>\n<p><em>Meltdown<\/em> was a simple attack in which only four lines of computer code were enough to gain access.<\/p>\n<p><em>Load Value Injection<\/em> reverses this method: The attacked computer processor continues to operate with false data <em>injected<\/em> into the computer by attackers.<\/p>\n<p>A video about <em>Load Value Injection<\/em> can be found <a href=\"https:\/\/www.youtube.com\/watch?time_continue=42&amp;v=baKHSXeIIaI&amp;feature=emb_logo\">here<\/a>.<\/p>\n<h3>Sensitive area in the computer processor affected<\/h3>\n<p>The vulnerability is a hardware virus that can be exploited at the software level. The hardware extension <a href=\"https:\/\/en.wikipedia.org\/wiki\/Software_Guard_Extensions\">Software Guard Extensions (SGX) Enclaves<\/a> developed by Intel is affected. This extension was designed to protect the area of the computer processor where sensitive data is processed. This means that it should not be possible to execute code in this area.<\/p>\n<p>In fact, for an attack, one would only have to write software that uses SGX enclaves, explains Daniel Gruss from the Graz research team. For example, a video streaming service could use the vulnerability to protect its own videos &#8211; even though they are played on a foreign laptop, the researcher says.<\/p>\n<h3>Closing the security gap<\/h3>\n<p>Intel, the manufacturer of <em>SGX Enclaves<\/em> software, was already informed of the vulnerability in April 2019. A long period of secrecy was agreed upon. This allowed Intel to make the necessary fixes and prevent computer users from being exposed to unnecessary risk. Closing the gap requires either massive intervention in the software or a completely new processor. The researchers have developed a software solution in parallel with Intel, but this will result in massive performance losses.<\/p>\n<p>The research team recommends installing all security updates from the manufacturers and securing your own computer system. The first public information has already been published on the website <a href=\"https:\/\/lviattack.eu\/\">lvi attack.eu<\/a>. The scientific paper will be presented at the <a href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/\">IEEE Security and Privacy Symposium<\/a> in San Francisco in May.<\/p>\n<p>The team:<br \/>\n&#8211; <em>KU Leuven<\/em>: Jo Van Bulck and Frank Piessens<br \/>\n&#8211; <em>Worcester Polytechnic Institute:<\/em> Daniel Moghimi and Berk Sunar<br \/>\n&#8211; <em>Graz University of Technology:<\/em> Michael Schwarz, Moritz Lipp and Daniel Gruss<br \/>\n&#8211; <em>University of Michigan:<\/em> Marina Minkin and Daniel Genkin<br \/>\n&#8211; <em>University of Adelaide <\/em>and <em>Data61:<\/em> Yuval Yarom.<\/p>\n<h3>The discovery of computer hardware viruses<\/h3>\n<p>Michael Schwarz, Moritz Lipp and Daniel Gruss from the <a href=\"https:\/\/www.iaik.tugraz.at\/\">Institute for Applied Information Processing and Communication Technology<\/a> at Graz University of Technology have acquired expertise in the detection of security vulnerabilities in computer processors &#8211; those that affect hardware. The discovery of computer hardware viruses is still new. Until 2018 it was assumed that only software viruses existed. <em>Meltdown<\/em> and <em>Spectre<\/em>, the first hardware viruses, were discovered simultaneously by several research teams. The three Graz researchers were there, together with Professor Stefan Mangard. Since then, the team has repeatedly published new security vulnerabilities in international collaboration.<\/p>\n<p><strong>Also interesting:<\/strong><br \/>\n<a href=\"https:\/\/innovationorigins.com\/de\/zombieload-2-0-sicherheitsluecke-trotz-update\/\">ZombieLoad 2.0 &#8211; Security hole despite update<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An international research team has once again discovered a serious security vulnerability in computer processors: Load Value Injection.\u00a0The vulnerability enables a new type of attack: Not only can sensitive data and keys be stolen, but also attacker data can be injected. Load Value Injection follows on from a series of vulnerabilities that make the architecture [&hellip;]<\/p>\n","protected":false},"author":1688,"featured_media":517124,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[42],"tags":[48462,48464,9192,48466,31696],"location":[6763],"article_type":[],"serie":[],"archives":[],"internal_archives":[],"reboot-archive":[],"class_list":["post-212546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sustainability-nl","tag-computer-processor","tag-graz-university-of-technology","tag-intel","tag-security-hole","tag-tu-graz-en","location-netherlands"],"blocksy_meta":[],"acf":{"subtitle":"","text_display_homepage":false},"author_meta":{"display_name":"Hildegard Suntinger","author_link":"https:\/\/ioplus.nl\/archive\/author\/hildegard-suntinger\/"},"featured_img":"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2020\/03\/F-LU-19-ZombieLoad-bammer-tugraz-48-scaled-300x200.jpg","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">Sustainability<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Sustainability<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">Computer processor<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">Graz University of Technology<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">Intel<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">Security hole<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">TU Graz<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Computer processor<\/span>","<span class=\"advgb-post-tax-term\">Graz University of Technology<\/span>","<span class=\"advgb-post-tax-term\">Intel<\/span>","<span class=\"advgb-post-tax-term\">Security hole<\/span>","<span class=\"advgb-post-tax-term\">TU Graz<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 6 years ago","modified":"Updated 6 years ago"},"absolute_dates":{"created":"Posted on March 12, 2020","modified":"Updated on March 12, 2020"},"absolute_dates_time":{"created":"Posted on March 12, 2020 10:54 am","modified":"Updated on March 12, 2020 10:54 am"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/212546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/users\/1688"}],"replies":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/comments?post=212546"}],"version-history":[{"count":0,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/212546\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media\/517124"}],"wp:attachment":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media?parent=212546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/categories?post=212546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/tags?post=212546"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/location?post=212546"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/article_type?post=212546"},{"taxonomy":"serie","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/serie?post=212546"},{"taxonomy":"archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/archives?post=212546"},{"taxonomy":"internal_archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/internal_archives?post=212546"},{"taxonomy":"reboot-archive","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/reboot-archive?post=212546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}