Russian researchers unlock Intel processors for reverse engineering

By
Follow google news

CPU bug exploited to reveal all.

Security researchers have discovered a way to gain full access to Intel processors, exploiting a hardware bug in the chips to unlock them for reverse engineering.

Russian researchers unlock Intel processors for reverse engineering

A proof-of-concept published by Russian security vendor Positive Technologies comes with detailed instructions on how to unlock processors to gain access.

Hardware hacker and director of Canberra-based security training company InfoSect, Dr Silvio Cesare, says the research allows people to reverse engineer Intel processors to a level that hasn't been possible before.

"The research looks at a method to gain very deep introspection into Intel CPUs," Cesare said.

It does this by exploiting a bug in the CPU that Intel has released an advisory on, and then unlocking the CPU to see the chip's internals through an interface known as JTAG. Developed by the Joint Testing Action Group, JTAG is a chip-level interface.

"JTAG allows the use of hardware level debuggers, which essentially gives us the ability to inspect and interact within the deepest levels of the processor," Cesare said.

Cesare said the findings would mostly enable research into vulnerabilities that affect end users.

"Things like all the speculative execution bugs (Spectre, Meltdown etc) become easier to discover and analyse with this level of debug access," Cesare told iTnews.

While the research isn't likely to discover a vulnerability that affects everyone today, there is a chance of that happening in three-to-five years, Cesare added.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Poor WA gov M365 security led to $71k theft and children's data breached

Poor WA gov M365 security led to $71k theft and children's data breached

US medical device maker Stryker's Microsoft environment attacked

US medical device maker Stryker's Microsoft environment attacked

CBA chief impersonated in global investment fraud on Facebook

CBA chief impersonated in global investment fraud on Facebook

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Log In

  |  Forgot your password?