iTnews

Intel to add anti-malware tech to processors

By Juha Saarinen on Jun 16, 2020 12:25PM
Intel to add anti-malware tech to processors

NOP to ROP, JOP and COP with CET.

Chip giant Intel intends to add hardware protection against common malware attacks into its processors, work that is four years in gestation.

Known as control-flow enforcement technology or CET, the protection measures target three types of attacks used by malware writers and can be enabled by software developers.

These include jump and call oriented programming (JOP and COP) that allow attackers to misuse existing code to jump to arbitrary memory addresses used by running programs, to change those programs' behaviour.

CET restricts JOP/COP attacks in software, with indirect branch tracking (IBT) that prevents such arbitrary address jumping.

Another popular malware technique is return-oriented programming (ROP), in which attackers pervert the intended flow of code in a legitimate program and turn it to malicious actions.

ROP attacks are hard to detect, and target operating systems, web browsers and document and image reader apps.

Using CET, developers can program operating systems to create a Shadow Stack area that stores return memory addresses held in processors.

Since it is protected against application code memory access, Shadow Stacks can't be modified. 

CET will detect if there's a mismatch between what's stored in the Shadow Stack, and what's in the program's data stack and will throw an exception to the operating system to prevent attacks.

The new security features will appear in Intel's upcoming Tiger Lake mobile processor range, and Microsoft has added support for CET in Windows 10 Insider previews, calling it Hardware-enforced Stack Protect.

How effective CET will be remains to be seen.

Sounding a cautionary note when announcing the CET-enabled CPUs, Intel said that "no product or component can be absolutely secure".

CET is in its third revision [pdf] since 2016.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
cetcophardwareinteljopmalwarereturn oriented programmingropsecurity

Partner Content

Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Operationalising net zero to be centre stage at IoT Impact conference
Partner Content Operationalising net zero to be centre stage at IoT Impact conference
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Matt Tett to lead essential primer session on security by design
Partner Content Matt Tett to lead essential primer session on security by design

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Juha Saarinen
Jun 16 2020
12:25PM
0 Comments

Related Articles

  • RBA pushes first IaaS workload into Azure
  • Google adds phishing protection to Workspace apps
  • Clean Energy Regulator swaps Fujitsu for Digital61
  • New micro-op cache attacks break all Spectre defences
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

What to expect from the incoming Labor government

What to expect from the incoming Labor government

Digital Nation

COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.