The "Meltdown" Story: How A Researcher Discovered The "Worst" Flaw In Intel History

The "Meltdown" Story: How A Researcher Discovered The "Worst" Flaw In Intel History


Daniel Gruss didn't sleep much the night he hacked his own computer and exposed a flaw in most of the chips made in the past two decades by hardware giant Intel, something we discussed in "Why The Implications Of The Intel "Bug" Are Staggering." And as Reuters describes in fascinating detail, the 31-year-old information security researcher and post-doctoral fellow at Austria's Graz Technical University had just breached the inner sanctum of his computer's CPU and stolen secrets from it.

Until that moment, Gruss and colleagues Moritz Lipp and Michael Schwarz had thought such an attack on the processor's 'kernel' memory, which is meant to be inaccessible to users, was only theoretically possible.

"When I saw my private website addresses from Firefox being dumped by the tool I wrote, I was really shocked," Gruss told Reuters in an email interview, describing how he had unlocked personal data that should be secured.

Gruss, Lipp and Schwarz, working from their homes on a weekend in early December, messaged each other furiously to verify the result.

"We sat for hours in disbelief until we eliminated any possibility that this result was wrong," said Gruss, whose mind kept racing even after powering down his computer, so he barely caught a wink of sleep.

Gruss and his colleagues had just confirmed the existence of what he regards as "one of the worst CPU bugs ever found".

The flaw, now named Meltdown, was revealed on Wednesday and affects most processors manufactured by Intel since 1995.

Separately, a second defect called Spectre has been found that also exposes core memory in most computers and mobile devices running on chips made by Intel, Advanced Micro Devices and ARM Holdings, a unit of Japan's Softbank.

Both would enable a hacker to access secret passwords or photos from desktops, laptops, cloud servers or smartphones. It's not known whether criminals have been able to carry out such attacks as neither Meltdown nor Spectre leave any traces in log files.

Intel says it has started providing software and firmware updates to mitigate the security issues. ARM has also said it was working with AMD and Intel on security fixes.

Finding a Fix

The discovery was originally reported by online tech journal The Register. As a result of that report, research on the defect was published a week earlier than the manufacturers had planned, before some had time to work out a complete fix.

The Graz team had already been working on a tool to defend against attempts to steal secrets from kernel memory.

In a paper presented last June they called it KAISER, or Kernel Address Isolation to have Side-channels Effectively Removed.

As the name suggests, KAISER seeks to defend the kernel memory from a so-called side-channel attack that exploits a design feature of modern processors that increases their speed.

This involves processors executing tasks "out-of-order", and not in the sequence received. If the CPU makes the right speculative call, time is saved. Get it wrong and the out-of-order task is cancelled and no time is lost.

Researcher Anders Fogh wrote in a subsequent blog  that it might be possible to abuse so-called speculative execution in order to read kernel memory. He was not able to do so in practice, however.

Responsible Disclosure

Only after the December self-hacking episode did the significance of Graz team's earlier work become clear. It turned out that the KAISER tool presented an effective defense against Meltdown. The team quickly got in touch with Intel and learned that other researchers - inspired in part by Fogh's blog - had made similar discoveries.

They were working under so-called responsible disclosure, where researchers inform affected companies of their findings to give them time to prepare 'patches' to repair flaws they have exposed.

The key players were independent researcher Paul Kocher and the team at a company called Cyberus Technology, said Gruss, while Jann Horn at Google Project Zero came to similar conclusions independently.

"We merged our efforts in mid-December with the team around Paul Kocher and the people from Cyberus Technology to work on two solid publications on Meltdown and Spectre," said Gruss.

Gruss had not even been aware of the work Horn was doing.

"Jann Horn developed all of this independently - that's incredibly impressive," he said. "We developed very similar attacks, but we were a team of 10 researchers."

The wider team said patches for Meltdown, based on KAISER, had been readied for Microsoft and Apple operating systems, as well as for the Linux open-source system.

There is as yet no fix for Spectre, which tricks programmes into leaking their secrets but is viewed as a harder exploit for a hacker to carry out.

Asked which of the two flaws posed the greater challenge, Gruss said: "The immediate problem is Meltdown. After that it is going to be Spectre. Spectre is more difficult to exploit but also to mitigate. So in the long run I'd bet on Spectre."


Views: 71

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

cheeki kea commented on Burbia's video
Thumbnail

Soros Will Never Recover..Elon AIR The whole Thing

"Good find Burbia. It can only get worse. Is Soros too big to fail for he has his thumb in every pie…"
8 hours ago
Doc Vega posted blog posts
8 hours ago
Doc Vega commented on Doc Vega's blog post What's Meant to Be?
"tjdavis Thanks for your support Dude! "
11 hours ago
tjdavis posted photos
23 hours ago
tjdavis favorited Doc Vega's blog post What's Meant to Be?
yesterday
tjdavis posted a video

PORCUPINE TREE - BUYING NEW SOUL (HD)

Filmed at the Park West, Chicago, USA, 11-12 Oktober 2005
yesterday
Burbia commented on Burbia's video
Thumbnail

Meet GibberLink, Conversational AI's secret language

"One agent's audio range has a lower frequency than the other. Another example of different…"
yesterday
Burbia posted a video

Meet GibberLink, Conversational AI's secret language

Join Boris Starkov and Anton Pidkuiko, the developers behind GibberLink, for a fireside chat with Luke Harries from ElevenLabs.On February 24, Georgi Gergano...
yesterday
Doc Vega posted blog posts
Saturday
Doc Vega posted a blog post

Interpersonal Insanity

Interpersonal Insanity How do you expect me to read your mind?All those hidden things that I might…See More
Friday
cheeki kea replied to cheeki kea's discussion Tartaria
"Look at what we have to put up with. Leftist journalism in full swing. Everyone knows who created…"
Friday
Doc Vega posted a blog post

Why Did We Americans Become so Cynical? At Least Those Who Think

 Cynicism is a form of counter intelligence. It materializes when the general public has been…See More
Wednesday
tjdavis posted a video
Wednesday
Doc Vega posted blog posts
Apr 15
cheeki kea commented on Snakedaddy's album
Thumbnail

a soon shit

"lol at first I thought this was an acronym or phase meaning an urgent trip to the lavatory but alas…"
Apr 15
tjdavis posted a video

Europe will be an Islamic Muslim State

සිංහලෙන් කියවන්න http://sinhalabuddhist.comSlavery, Terrorism and Islam: The Historical Roots and Contemporary Threat.. Adapted from Dr. Peter Hammond's book...
Apr 14
Sandy posted a video

A conversation with Charlotte Iserbyt

“The Deliberate Dumbing Down of America — A Chronological Paper Trail”, will change forever the way you look at your child’s education. Written by whistleblo...
Apr 14
Doc Vega posted a blog post

Realizations

Used to think I had something special to bringThat I was seeing what others weren't seeingThe…See More
Apr 13
Burbia replied to cheeki kea's discussion Tartaria
"I forget some written language reads from right to left. The various calendars used up to now from…"
Apr 13
Less Prone favorited Burbia's blog post Mystery illness strikes Russia with fever, blood symptoms, and no cure in sight.
Apr 13

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted