Sign In

Communications of the ACM

ACM TechNews

Intel Server-Grade CPUs Impacted by New NetCAT Attack


View as: Print Mobile App Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
Intel CPU chips.

Vrije University researchers ahve described a new exploit targeting Intel central processing units (CPU) that support Data-Direct I/O Technology and Remote Direct Memory Access features.

Credit: David Latorre Romero

Researchers at Vrije University in the Netherlands described a new exploit targeting Intel central processing units (CPU) that support Data-Direct I/O Technology (Intel DDIO) and Remote Direct Memory Access (RDMA) features.

The NetCAT side-channel attack against remote, networked systems is facilitated when both features are enabled, allowing hackers to deduce certain kinds of data being processed in the CPU's cache.

The technique looks for slight variations in how long the CPU needs to process data, then guesses what data may have been processed.

The Intel DDIO and RDMA features affect the NetCAT hack through network packets sent to a computer's network card; Intel DDIO permits peripherals to directly access write data inside the cache, rather than random-access memory, while RDMA can accelerate networking speed and throughput to make the attack more efficient.

A patch for this exploit is not yet available.

From ZDNet
View Full Article

 

Abstracts Copyright © 2019 SmithBucklin, Washington, DC, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
ACM Resources