Results 1 to 6 of 6

Thread: News - Scientists demonstrate malware designed to attack specific CPUs

  1. #1
    HEXUS.admin
    Join Date
    Apr 2005
    Posts
    31,709
    Thanks
    0
    Thanked
    2,073 times in 719 posts

    News - Scientists demonstrate malware designed to attack specific CPUs

    OS-agnostic attacks could be the future of malicious software.
    Read more.

  2. #2
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Re: News - Scientists demonstrate malware designed to attack specific CPUs

    err am I missing something? FSINCOS can let them see the family of the CPU. Oh horror.

    A buffer overflow is often more dependant on the compiler and OS than how to differentiate between an Atom and a i7.

    There was the whole thing a while ago, someone with physical access could potentially determine the result of a calculation they shouldn't by looking at tiny variations in the voltage, and then by seeing how the pipelining changed, but that would require knowledge of everything else on the machine, not just the OS but EVERY module running.

    Compared to that knowledge of every process (heck a decent VAX team decened OS won't even let you know the pid/name/anything of a process your not able to know about) is far more worrying that guessing my CPU family.

    Fail to really see the story? Am I just lacking imagination.
    throw new ArgumentException (String, String, Exception)

  3. #3
    Senior Member
    Join Date
    Aug 2008
    Posts
    1,894
    Thanks
    92
    Thanked
    84 times in 64 posts
    • miniyazz's system
      • CPU:
      • Acer Aspire 8920G
      • Operating System:
      • Windows 7 Pro
      • Monitor(s):
      • Optoma HD700X projector @ c. 90"
      • Internet:
      • Really, really ****

    Re: News - Scientists demonstrate malware designed to attack specific CPUs

    Wait, my computer gets a different result than my phone when calculating the same thing?

  4. #4
    Member
    Join Date
    May 2009
    Location
    London
    Posts
    178
    Thanks
    19
    Thanked
    11 times in 11 posts
    • BullDogg's system
      • CPU:
      • AMD Athlon II X3 720BE (Core unlocked)
      • Graphics card(s):
      • 2x HD4870 1GB (CrossfireX)
      • Operating System:
      • Windows 7 Home Premium 64-bit

    Re: News - Scientists demonstrate malware designed to attack specific CPUs

    Quote Originally Posted by TheAnimus View Post
    Fail to really see the story? Am I just lacking imagination.
    You probably know far more about it than me, but I recommend you either go read the original paper or the detailed analysis. These guys are computer scientists specialising in malicious software, so I trust that if they think it's important enough to publish a paper on, it probably is. I can't for the life of me tell you why though.

    As far as I can tell, it's not to do with the complier or OS, and that's the whole point. You can run the code directly on the CPU without interacting with the OS at all. But again, I'm not entirely sure. This is just the first step saying that it MIGHT be possible.

  5. #5
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Re: News - Scientists demonstrate malware designed to attack specific CPUs

    Which OS lets you do that? If your outside of the usermode, and in kernel mode (ring 0) even that is 'fettered' by the OS.

    Also an academic publishing a paper that is pointless, who'd have thought it.
    throw new ArgumentException (String, String, Exception)

  6. #6
    HEXUS webmaster Steve's Avatar
    Join Date
    Nov 2003
    Posts
    14,283
    Thanks
    293
    Thanked
    841 times in 476 posts

    Re: News - Scientists demonstrate malware designed to attack specific CPUs

    I was about to yell "CPUID", but the paper has that one covered:
    The Intel Assembly Language instruction CPUID can be used both on Intel
    and AMD processors, but it has at least two severe drawbacks:
    – it is easy to “find” it whenever scanning the file (malware detection issue);
    – some other processors cannot recognize and process this instruction.
    Very quickly reading the paper, it looks like they propose that the method would be used for "surgical strikes" against particular [types of] machines, so it's more about identifying what to attack, rather than identifying the processor to enable them to use a particular exploit.

    So, TheAnimus' point about buffer overflows remains true, but it doesn't appear they care about that. However, if for your malware to be successful it depends on a particular OS/app bug to embed itself, what's the point of an OS/app agnostic CPU identification process, unless perhaps it simplifies the process of writing malware?

    Flipping the coin, and assuming you did want to attack a particular processor because of the fact that processor P enables you to use some exploit X, would that be possible? Well, modern microarchitectures are so damn complicated and the errata run for pages, so it wouldn't surprise me if this was so. Then again, microcode, BIOS and OS updates are usually put in place to work around the most serious of these.

    As for using dynamic power analysis as an attack on systems, I've seen just how weak smart card and chip & pin devices are - it's scary. Using it on a bigger system? I think once your attacker has physical access to the system, you probably have other things to worry about, although I guess it's a case of whether a DPA attack on such a complex system is less effort than breaking the encryption on whatever link it is you have access to tap into.

    Disclaimer: I skipped over most of the paper, as it was 8:10 in the morning and too early to be digesting formal definitions of polymorphic virii.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 1
    Last Post: 09-08-2009, 02:56 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •