Research shows how Plundervolt could mess with Intel CPUs

Cutting to the chase: Plundervolt. "Modern processors are being pushed to perform faster than ever before-and with this comes increases in heat and power consumption," said a team of researchers on their own Plundervolt website page, with the subhead "How a little bit of undervolting can cause a lot of problems."

Plundervolt is the name of a type of attack they explored.

Many chip manufacturers allow frequency and voltage to be adjusted as and when needed, they continued, but more than that "they offer the user the opportunity to modify the frequency and voltage through privileged software interfaces. With Plundervolt we showed that these software interfaces can be exploited to undermine the system's security."

In the conclusion section of their research paper, the group stated that "our work provides further evidence that the enclaved execution promise of outsourcing sensitive computations to untrusted remote platforms creates new and unexpected attack surfaces that continue to be relevant and need to be studied further."

They said that "With Plundervolt we showed that these software interfaces can be exploited to undermine the system's security." Plundervolt specifically targets Intel Software Guard eXtensions (SGX).

"We were able to corrupt the integrity of Intel SGX on Intel Core processors by controling the voltage when executing enclave computations." (Intel SGX is a set of security-related instruction codes built into Intel CPUs.)

Who is this team? The answer is not just one security business but a research team across borders: Kit Murdock, David Oswald, Flavio D Garcia (The University of Birmingham); Jo Van Bulck, Frank Piessens (imec-DistriNet, KU Leuven); and Daniel Gruss (Graz University of Technology).

Before that, Navjivan Pal, in his final year project at the University of Birmingham under Oswald's supervision, had looked at the potential of using undervolting for faulting (non-SGX) computations.

Catalin Cimpanu in ZDNet reported what Oswald at the University of Birmingham had told ZDNet. "The undervolting induces bit flips in CPU instructions itself, such as multiplications or AES rounds (AES-NI)."

No, even Intel SGX's memory encryption/authentication technology cannot protect against Plundervolt, said the investigators.

In addition to extraction of cryptographic keys, Plundervolt, they found, can cause "memory safety misbehaviour in certain scenarios." Out-of-bounds accesses may arise when an attacker faults multiplications emitted by the compiler for array element indices or pointer arithmetic, they said. "Plundervolt can break the processor's integrity guarantees, even for securely written code."

The Plundervolt site carried a list of questions and answers, and one of the questions was, "Should I now throw away my CPU or stop using SGX altogether?" Their answer was, "No, definitely not. If you are not using SGX, no actions are required. If you are using SGX, it suffices to apply the microcode update provided by Intel to mitigate Plundervolt."

Plundervolt was first reported in June 7. The team found that "Intel responded quickly after we started the responsible disclosure process." Since then, Intel discussed the issue with them and kept them informed of their timeline.

The CVE is CVE-2019-11157.

Intel released its security advisory, first on Dec. 10 and then, at the time of this writing, with an update on Dec. 11," Intel Processors Voltage Settings Modification Advisory,"INTEL-SA-00289.

Regarding Dec. 10, elsewhere on Intel, Jerry Bryant, director of security communication in the Intel Platform Assurance and Security group, had this to say in a "Technology at Intel" blog of Dec. 10:

"When SGX is enabled on a system, a privileged user may be able to mount an attack through the control of CPU voltage settings with the potential to impact the confidentiality and integrity of software assets. Intel has worked with system vendors to develop a microcode update that mitigates the issue by locking voltage to the default settings."

Damage thus far? Bryant reported that "We are not aware of any of these issues being used in the wild."

Paul Lilly in Hot Hardware: "Fortunately, this can't be leveraged remotely, meaning an attacker couldn't lure a user to a compromised website and then carry out the attack. Plundervolt runs from an app on an infected PC with root or admin privileges, and does not even work in virtualized environments. So even though it is a High level security flaw, the chances of this impacting a user is pretty small."

Bryant reiterated the advice that "we recommend installing security updates as soon as possible." He said "Your computer manufacturer is the best source to obtain most updates from." He offered a link for the list of computer manufacturer support sites.

You can read the details of their work in their paper, "Plundervolt: Software-based Fault Injection Attacks against Intel SGX."

"We present Plundervolt," said the authors and they described it as a software-based fault attack on Intel Core x86 processors.

Website search

Recently updated

eScanAV AntiVirus Toolkit eScanAV AntiVirus Toolkit Analyzes important areas of your computer, such as the registry, system folders, startup items, running services and the memory to detect potential dangerous content
OPSWAT Metadefender Client OPSWAT Metadefender Client Detects potential security threats using multiple antivirus engines and helps you deal with known vulnerabilities, wrapped in a user-friendly interface
RemoveIT Pro 2017 Security Ultra RemoveIT Pro 2017 Security Ultra Using this straightforward application you can scan your computer for spyware and viruses, as well as manage the startup programs

Software News

Jan 17
Researchers from Dartmouth and the Massachusetts Institute of Technology (MIT) have developed an original approach to flight scheduling that, if implemented, could result in a significant increase in profits for airlines ...
Jan 15
The National Security Agency has discovered a major security flaw in Microsoft's Windows 10 operating system that could allow hackers to intercept seemingly secure communications.
Jan 14
If you're still using Microsoft's Windows 7, your computer might soon be at risk.
Jan 9
Microsoft says it has developed a technique to detect online predators who try to groom children for sexual purposes using the chat function in multiplayer video games.
Jan 9
Apps are still alive and well, and when it comes to gaming, incredibly popular and still thriving.
Jan 7
Do you ever feel as if your voice assistants-whether Siri, Alexa, or Google-don't understand you? You might repeat your question a little slower, a little louder, but eventually you'll get the information you were asking ...
Jan 7
Nuclear scientists at Oak Ridge National Laboratory have established a Nuclear Quality Assurance-1 program for a software product designed to simulate today's commercial nuclear reactors-removing a significant barrier for ...

About us

Welcome to new crack resource! Our service can generate cracks, keygens and serials for your software to unlock it. CrackDownloadz provides a lot of popular cracks and keygens. No spyware and adware at all, just download new cracks, keygens and serials. If you have a software that needs a crack feel free to contact us.

Also you may contact us if you have software that needs to be removed from our website.