Intel has announced that its 10nm Tiger Lake CPUs will be boast a new hardware-based security feature to protect against Spectre-like malware attacks.
The laptop processors will be the first to come with would be the new Intel Control-Flow Enforcement Technology (CET), which Intel claims offers protection against the misuse of legitimate code through control-flow hijacking attacks, a type of malware that has been notoriously difficult to mitigate through software.
Jointly developed by Intel and Microsoft, the technology provides two new key capabilities to help guard against control-flow hijacking malware: Shadow Stack (SS) and Indirect Branch Tracking (IBT).
[ul]
[li]Everything you need to know about Intel Tiger Lake[/li][li]Weâve rounded up the best antivirus for 2020[/li][li]Best processors 2020: The best CPUs from Intel and AMD[/li][/ul]
Shadow Stack refers to a copy of a programâs intended execution flow which is used to ensure no unauthorized changes take place in an appâs intended execution order to defend against ROP attack methods. IBT, on the other hand, delivers indirect branch protection to defend against jump/call-oriented programming (JOP/COP) attack methods.
âIntel CET is designed to protect against the misuse of legitimate code through control-flow hijacking attacksâwidely used techniques in large classes of malware,â Intel VP & GM of Client Security Strategy and Initiatives Tom Garrison said.
Intelâs CET will be available in mobile CPUs that use the Tiger Lake microarchitecture, and the technology will also be available in the firmâs future desktop and server platforms.
No future Meltdowns
As has been well documented, Intel has had a rough few years when it comes to CPU security. Most notably, it was discovered in 2018 that all Intel CPUs produced in the last 20 years were vulnerable to the âcatastrophicâ Spectre and Meltdown vulnerabilities.
These hardware flaws enabled normal user programs, such as database applications and JavaScript in web browsers, to identify some of the layout or contents of protected kernel memory areas of the vulnerable chips.
More recently, a flaw called âSpoilerâ was discovered that, like Spectre, enabled an attacker to exploit the way the PCâs memory works to glimpse data from running programs and other critical data which should otherwise not be accessible.
[ul]
[li]Latest Intel CPUs have âimpossible to fixâ security flaw[/li][/ul]
Continue readingâŚ
The laptop processors will be the first to come with would be the new Intel Control-Flow Enforcement Technology (CET), which Intel claims offers protection against the misuse of legitimate code through control-flow hijacking attacks, a type of malware that has been notoriously difficult to mitigate through software.
Jointly developed by Intel and Microsoft, the technology provides two new key capabilities to help guard against control-flow hijacking malware: Shadow Stack (SS) and Indirect Branch Tracking (IBT).
[ul]
[li]Everything you need to know about Intel Tiger Lake[/li][li]Weâve rounded up the best antivirus for 2020[/li][li]Best processors 2020: The best CPUs from Intel and AMD[/li][/ul]
Shadow Stack refers to a copy of a programâs intended execution flow which is used to ensure no unauthorized changes take place in an appâs intended execution order to defend against ROP attack methods. IBT, on the other hand, delivers indirect branch protection to defend against jump/call-oriented programming (JOP/COP) attack methods.
âIntel CET is designed to protect against the misuse of legitimate code through control-flow hijacking attacksâwidely used techniques in large classes of malware,â Intel VP & GM of Client Security Strategy and Initiatives Tom Garrison said.
Intelâs CET will be available in mobile CPUs that use the Tiger Lake microarchitecture, and the technology will also be available in the firmâs future desktop and server platforms.
No future Meltdowns
As has been well documented, Intel has had a rough few years when it comes to CPU security. Most notably, it was discovered in 2018 that all Intel CPUs produced in the last 20 years were vulnerable to the âcatastrophicâ Spectre and Meltdown vulnerabilities.
These hardware flaws enabled normal user programs, such as database applications and JavaScript in web browsers, to identify some of the layout or contents of protected kernel memory areas of the vulnerable chips.
More recently, a flaw called âSpoilerâ was discovered that, like Spectre, enabled an attacker to exploit the way the PCâs memory works to glimpse data from running programs and other critical data which should otherwise not be accessible.
[ul]
[li]Latest Intel CPUs have âimpossible to fixâ security flaw[/li][/ul]
Continue readingâŚ