Article 59N7E In a first, researchers extract secret key used to encrypt Intel CPU code

In a first, researchers extract secret key used to encrypt Intel CPU code

by
Dan Goodin
from Ars Technica - All content on (#59N7E)
intel-atom-800x534.jpg

Enlarge (credit: Intel)

Researchers have extracted the secret key that encrypts updates to an assortment of Intel CPUs, a feat that could have wide-ranging consequences for the way the chips are used and, possibly, the way they're secured.

The key makes it possible to decrypt the microcode updates Intel provides to fix security vulnerabilities and other types of bugs. Having a decrypted copy of an update may allow hackers to reverse-engineer it and learn precisely how to exploit the hole it's patching. The key may also allow parties other than Intel-say a malicious hacker or a hobbyist-to update chips with their own microcode, although that customized version wouldn't survive a reboot.

At the moment, it is quite difficult to assess the security impact," independent researcher Maxim Goryachy said in a direct message. But in any case, this is the first time in the history of Intel processors when you can execute your microcode inside and analyze the updates." Goryachy and two other researchers-Dmitry Sklyarov and Mark Ermolov, both with security firm Positive Technologies-worked jointly on the project.

Read 10 remaining paragraphs | Comments

index?i=ODPfZQox5rc:_cONr3mscdk:V_sGLiPB index?i=ODPfZQox5rc:_cONr3mscdk:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments