CPU Hyper-threading Reverse Engineered to Spy on Processes
One of the most useful features in computer hardware has a security flaw. It's to do with the way processors handle information.
All computing tasks are reduced down to a set of calculations. The central processing unit (CPU) is the "brain" of the computer that physically carries out these calculations. Each modern-day CPU has one or more cores, which is essentially multiple "brains" on a single CPU chip. A multi-core CPU means that multiple calculations can be done at once, which reduces the time to carry out a task.
Many processors also use a technique called simultaneous multithreading (also known as hyper threading) - somewhat similar to a multi-core system, but not quite the same. The technique is a little like breaking a task down into a to-do list of individual steps - known as a thread - and then having a CPU core rapidly switch back and forth between the top item on multiple threads.
This means the processor core works much more efficiently because it's not sitting idle, waiting for a single thread to complete from start to finish. Instead, it's switching back and forth between multiple threads. The effect is closer to what would happen if each core could literally do two things at once.
Related: Which Processor is Better: Intel or AMD? - Explained
Data Flow Reveals Contents
Security researchers have now uncovered an unwanted side effect of the multi-threaded approach. They say it's possible for a program running on one thread to look at the precise speed at which another thread is being processed, then reverse-engineer it to figure out the actual data that's being processed.
Researcher Billy Bob Brumley said it's possible to do this using a process of elimination. He likened it to two people pouring jelly beans through the same funnel; if one person measures how fast their beans are passing through, they can figure out how fast the other beans are passing through as the two flows affect one another. (Source: bleepingcomputer.com)
Security Key Uncovered
To test and demonstrate the implications, the researchers set up two threads sharing the same core. One was the test software and another was OpenSSL, a widely used tool for checking security credentials and encrypting or decrypting data. The test software was able to see precisely how long it took to OpenSSL to carry out an operation involving a private key used to encrypt data. Based on this, the test software was able to figure out the key.
The good news is that this is less of a security threat in itself and more of a way for other exploits to become more serious. To take advantage of the loophole, a hacker would already need to have found a way to run software on the victim's machine and then make sure it was running on the same core as the targeted data. For the average home user, it's more of a reminder of the need to exercise security than a direct threat in itself. (Source: Sophos.com)
What's Your Opinion?
Would you be prepared to give up some speed on your computer to boost security? Are you surprised at how creative both researchers and hackers are at finding ways to exploit loopholes? Does publicizing loopholes such as this risk tipping off would-be cyber criminals of new techniques?
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.