Wednesday, October 2nd 2019
Intel's STORM Presents SAPM Paper on Hardware-Based Protection Against Side-Channel Execution Flaws
Intel's STrategic Offensive Research & Mitigations (STORM) department, which the company set up back in 2017 when it learned of side-channel attack vulnerabilities in its CPUs, have penned a paper detailing a proposed solution to the problem. Intel's offensive security research team counts with around 60 workers who focus on proactive security testing and in-depth investigations. Of that group, STORM is a subset of around 12 individuals who specifically work on prototyping exploits to show their practical impact. The solution proposed by this group is essentially a new memory-based hardware fix, going by the name of SAPM (Speculative-Access Protected Memory). The new solution would implement a resistant hardware fix in the CPU's memory that essentially includes blocks for known speculative-access hacks, such as the ones that hit Intel CPUs hard such as Meltdown, Foreshadow, MDS, SpectreRSB and Spoiler.
For now, the proposed solution is only at a "theory and possible implementation options" level. It will take a long time for it to find its way inside working Intel CPUs - if it ever does, really, since for now, it's just a speculative solution. A multitude of tests have to be done in order for its implementation to be approved and finally etched into good old silicon. Intel's STORM says that the SAPM approach would carry a performance hit; however, the group also calculates it to be "potentially lesser" than the current impact of all released software mitigations. Since the solution doesn't address every discovered side-channel attack specifically, but addresses the type of back-end operations that concern these attacks, the team is confident this solution would harden Intel CPUs against (most of) both known and not-yet-known speculative execution hacks.
Sources:
Intel, via Tom's Hardware, Wired
For now, the proposed solution is only at a "theory and possible implementation options" level. It will take a long time for it to find its way inside working Intel CPUs - if it ever does, really, since for now, it's just a speculative solution. A multitude of tests have to be done in order for its implementation to be approved and finally etched into good old silicon. Intel's STORM says that the SAPM approach would carry a performance hit; however, the group also calculates it to be "potentially lesser" than the current impact of all released software mitigations. Since the solution doesn't address every discovered side-channel attack specifically, but addresses the type of back-end operations that concern these attacks, the team is confident this solution would harden Intel CPUs against (most of) both known and not-yet-known speculative execution hacks.
24 Comments on Intel's STORM Presents SAPM Paper on Hardware-Based Protection Against Side-Channel Execution Flaws
They could end up hitting their head on a wall for the next 3-4 years like what they are doing all this time with their 10nm, if they take that road and still have to face future security problems that are still unknown. Intel should consider changing it's architecture and make security a priority.
It's not like they need to worry about selling server in the near future XD
"set up back in 2017 " --- doesn't mix with --- "as quickly as possible"
and ---- ""theory and possible implementation options" level. It will take a long time for it to find its way inside working Intel CPUs - if it ever does, really, since for now, it's just a speculative solution " --- doesn't mix with --- "still correcting" --- nor --- "implementing".
Either drunk or trolling much?
Hardware patches ?
How to ?
Like a x299 VROC Key ?
Still too vague to comment, but it sounds vaguely in that direction. I mean, the whole industry is reeling from the speculative execution thing. At least intel is trying. AMDs Spectre vulnerabilities have as far as I can tell been filed under "doesn't matter." Don't you wish...
The context is that Intel was never going to fix it, b/c they knew it will incur a perf penalty.
I'm saying this was a design decision and they just hoped it would never be exploited, so why fix it? Now, they have to pretend to do something.
And thank you for confirming your shill status by saying AMD is vulnerable and not doing anything lol. It's already fixed and not a big deal...unlike dumb dumb blue gorilla.
This is a less costly method of adapting to future unkown fixes in software via some kind of hardware facility. Weird, but not useless.
It took them over 2 years to write something, that an IT student could do as his mid year paper?
I mean... a block of memory where we will store evtl. patches and workarounds to be executed by the CPU at boot? And everything else is speculation, palm reading etc. ? LoL.
And AMD' s Spectre has been filled under doesn't matter and even then - these that _might_ be applicable under some unknown conditions - fixed. The architecture is completely different, so the execution of the given speculative access hack wouldn't work (Spectre 1.2) and the other one (1.1) was fixed in software or hardware (Zen2).
So yeah... that's that.
I'll take a job like that, easiest money ever.
Strategic Offensive... while the battlefield is already littered with dead bodies. Keep at it boys!
Call it mean... its just weak marketing failing hard IMO. And it only happens because we're out of options and saying 'No, what we have today is not fixable' is apparently worse than lying about it. This happens everywhere. Look at the climate discussion. We're heading towards the same inevitable conclusion, that we created monsters we'll never tame unless we are prepared for hard and painful resets.
Its a human thing, to look away from the core of a problem and fix what's there with bandaids...
But besides marketing, you seem to be questioning the engineering. Engineering can't simply get rid of speculative execution because the performance would tank hard. And going for a new design, as you suggest, is even riskier, because with the current architecture, at least you have a good idea of what needs to be mitigated and (hopefully) where and how to mitigate it. Of course, Intel can't sit on their current architecture forever, so at some point they'll have to bite the bullet and switch anyway. In the meantime, having a group of engineers dedicated to fixing these is the best possible news. Labeling said group as proactive and then saying it's working on currently known vulnerabilities is laughable, though. I'm hoping when they said "proactive" they meant the group is taking care of these vulnerabilities in future designs. But until Intel comes out and says just that, this may well be just my wishful thinking.
The optimist reading this article says 'great, hope they get there'. I'm a pessimist and I say 'money down the drain, won't change a thing'. If they couldn't fix it in the past decade, why now?
If its for future designs...that means Intel is inherently telling us they will keep pushing leaky hardware to the market for the foreseeable future (like they have been doing already for a few years now, does nobody question why the gen releases keep coming like they do?). I'm not seeing the positive there either... What Intel should be doing is get to results, and not talk about it. There is no positive spin here, and every time they try to get there, they fail hard. This company still hasn't bitten the bullet, but still tries to soften the blow in the most cost effective way. Understandable, but not commendable.
Spectre is not done and over with. There will be new vulnerabilities discovered.
www.intel.com/content/www/us/en/architecture-and-technology/engineering-new-protections-into-hardware.html
That's NOT a fix in my book.