‘Plundervolt’ attack breaches chip security with a shock to the system

Subscribers:
4,200
Published on ● Video Link: https://www.youtube.com/watch?v=6Jc6w1ZrIPw



Duration: 3:34
213 views
5


Reported today on TechCrunch

For the full article visit: https://techcrunch.com/2019/12/10/plundervolt-attack-breaches-chip-security-with-a-shock-to-the-system/

'Plundervolt' attack breaches chip security with a shock to the system

Today's devices have been secured against innumerable software attacks, but a new exploit called Plundervolt uses distinctly physical means to compromise a chip's security. By fiddling with the actual amount of electricity being fed to the chip, an attacker can trick it into giving up its innermost secrets.

It should be noted at the outset that while this is not a flaw on the scale of Meltdown or Spectre, it is a powerful and unique one and may lead to changes in how chips are designed.

There are two important things to know in order to understand how Plundervolt works.

The first is simply that chips these days have very precise and complex rules as to how much power they draw at any given time. They don't just run at full power 24/7; that would drain your battery and produce a lot of heat. So part of designing an efficient chip is making sure that for a given task, the processor is given exactly the amount of power it needs - no more, no less.

The second is that Intel's chips, like many others now, have what's called a secure enclave, a special quarantined area of the chip where important things like cryptographic processes take place. The enclave (here called SGX) is inaccessible to normal processes, so even if the computer is thoroughly hacked, the attacker can't access the data inside.

Kernel panic! What are Meltdown and Spectre, the bugs affecting nearly every computer and device?

The creators of Plundervolt were intrigued by recent work by curious security researchers who had, through reverse engineering, discovered the hidden channels by which Intel chips manage their own power.

Hidden, but not inaccessible, it turns out. If you have control over the operatin




Other Videos By Colin Boyd SEO


2019-12-10Oculus Link beta allows Quest users to play Rift games via PC connection
2019-12-10Is your startup protected against insider threats?
2019-12-10Twitch just locked down top streamers DrLupo, TimTheTatman, and Lirik
2019-12-10Lightroom finally adds direct photo import on iOS
2019-12-10The biggest announcements from Nintendo’s Indie World Showcase
2019-12-10Microsoft’s full-screen Windows 7 upgrade prompts start next month
2019-12-10'This is small talk purgatory': what Tinder taught me about love
2019-12-10Waze now allows you to report unplowed roads and black ice
2019-12-10The Mac Pro’s optional wheels cost $400
2019-12-10NHS data is a goldmine. It must be saved from big tech | James Meadway
2019-12-10‘Plundervolt’ attack breaches chip security with a shock to the system
2019-12-10Microsoft announces public preview of Microsoft Teams for Linux
2019-12-10Facebook tells US attorney general it won’t remove encryption from its messaging apps
2019-12-10Resident Evil 3: Nemesis remake gets April 2020 launch date
2019-12-10xs:code launches subscription platform to monetize open source projects
2019-12-10Y Combinator will now run its online Startup School multiple times per year
2019-12-10Google Assistant gets a customized alarm, based on weather and time
2019-12-10Facebook’s video calling Portal devices add WhatsApp login, new features and content
2019-12-10Apple’s most expensive Mac Pro will cost $50,848
2019-12-10Chrome now warns you when your password has been stolen
2019-12-10The Mac Pro and Pro Display XDR are now live in Apple’s store