Home Upload Photo Upload Videos Write a Blog Analytics Messaging Streaming Create Adverts Creators Program
Bebuzee Afghanistan Bebuzee Albania Bebuzee Algeria Bebuzee Andorra Bebuzee Angola Bebuzee Antigua and Barbuda Bebuzee Argentina Bebuzee Armenia Bebuzee Australia Bebuzee Austria Bebuzee Azerbaijan Bebuzee Bahamas Bebuzee Bahrain Bebuzee Bangladesh Bebuzee Barbados Bebuzee Belarus Bebuzee Belgium Bebuzee Belize Bebuzee Benin Bebuzee Bhutan Bebuzee Bolivia Bebuzee Bosnia and Herzegovina Bebuzee Botswana Bebuzee Brazil Bebuzee Brunei Bebuzee Bulgaria Bebuzee Burkina Faso Bebuzee Burundi Bebuzee Cabo Verde Bebuzee Cambodia Bebuzee Cameroon Bebuzee Canada Bebuzee Central African Republic Bebuzee Chad Bebuzee Chile Bebuzee China Bebuzee Colombia Bebuzee Comoros Bebuzee Costa Rica Bebuzee Côte d'Ivoire Bebuzee Croatia Bebuzee Cuba Bebuzee Cyprus Bebuzee Czech Republic Bebuzee Democratic Republic of the Congo Bebuzee Denmark Bebuzee Djibouti Bebuzee Dominica Bebuzee Dominican Republic Bebuzee Ecuador Bebuzee Egypt Bebuzee El Salvador Bebuzee Equatorial Guinea Bebuzee Eritrea Bebuzee Estonia Bebuzee Eswatini Bebuzee Ethiopia Bebuzee Fiji Bebuzee Finland Bebuzee France Bebuzee Gabon Bebuzee Gambia Bebuzee Georgia Bebuzee Germany Bebuzee Ghana Bebuzee Greece Bebuzee Grenada Bebuzee Guatemala Bebuzee Guinea Bebuzee Guinea-Bissau Bebuzee Guyana Bebuzee Haiti Bebuzee Honduras Bebuzee Hong Kong Bebuzee Hungary Bebuzee Iceland Bebuzee India Bebuzee Indonesia Bebuzee Iran Bebuzee Iraq Bebuzee Ireland Bebuzee Israel Bebuzee Italy Bebuzee Jamaica Bebuzee Japan Bebuzee Jordan Bebuzee Kazakhstan Bebuzee Kenya Bebuzee Kiribati Bebuzee Kuwait Bebuzee Kyrgyzstan Bebuzee Laos Bebuzee Latvia Bebuzee Lebanon Bebuzee Lesotho Bebuzee Liberia Bebuzee Libya Bebuzee Liechtenstein Bebuzee Lithuania Bebuzee Luxembourg Bebuzee Madagascar Bebuzee Malawi Bebuzee Malaysia Bebuzee Maldives Bebuzee Mali Bebuzee Malta Bebuzee Marshall Islands Bebuzee Mauritania Bebuzee Mauritius Bebuzee Mexico Bebuzee Micronesia Bebuzee Moldova Bebuzee Monaco Bebuzee Mongolia Bebuzee Montenegro Bebuzee Morocco Bebuzee Mozambique Bebuzee Myanmar Bebuzee Namibia Bebuzee Nauru Bebuzee Nepal Bebuzee Netherlands Bebuzee New Zealand Bebuzee Nicaragua Bebuzee Niger Bebuzee Nigeria Bebuzee North Korea Bebuzee North Macedonia Bebuzee Norway Bebuzee Oman Bebuzee Pakistan Bebuzee Palau Bebuzee Panama Bebuzee Papua New Guinea Bebuzee Paraguay Bebuzee Peru Bebuzee Philippines Bebuzee Poland Bebuzee Portugal Bebuzee Qatar Bebuzee Republic of the Congo Bebuzee Romania Bebuzee Russia Bebuzee Rwanda Bebuzee Saint Kitts and Nevis Bebuzee Saint Lucia Bebuzee Saint Vincent and the Grenadines Bebuzee Samoa Bebuzee San Marino Bebuzee São Tomé and Príncipe Bebuzee Saudi Arabia Bebuzee Senegal Bebuzee Serbia Bebuzee Seychelles Bebuzee Sierra Leone Bebuzee Singapore Bebuzee Slovakia Bebuzee Slovenia Bebuzee Solomon Islands Bebuzee Somalia Bebuzee South Africa Bebuzee South Korea Bebuzee South Sudan Bebuzee Spain Bebuzee Sri Lanka Bebuzee Sudan Bebuzee Suriname Bebuzee Sweden Bebuzee Switzerland Bebuzee Syria Bebuzee Taiwan Bebuzee Tajikistan Bebuzee Tanzania Bebuzee Thailand Bebuzee Timor-Leste Bebuzee Togo Bebuzee Tonga Bebuzee Trinidad and Tobago Bebuzee Tunisia Bebuzee Turkey Bebuzee Turkmenistan Bebuzee Tuvalu Bebuzee Uganda Bebuzee Ukraine Bebuzee United Arab Emirates Bebuzee United Kingdom Bebuzee United States Bebuzee Uruguay Bebuzee Uzbekistan Bebuzee Vanuatu Bebuzee Venezuela Bebuzee Vietnam Bebuzee World Wide Bebuzee Yemen Bebuzee Zambia Bebuzee Zimbabwe
Blog Image

Meltdown and Spectre: How chip hacks work

Most of the affected chips have been made by Intel, it appears

As technology companies race to fix two major vulnerabilities found in computer chips, the ways in which those chips could theoretically be targeted by hackers are becoming clear.

Collectively, Meltdown and Spectre affect billions of systems around the world - from desktop PCs to smartphones.

So why are so many different devices vulnerable - and what is being done to fix things?

What part of my computer is at risk?

When it is working, a computer shuffles around huge amounts of data as it responds to clicks, commands and key presses.

The core part of a computer's operating system, the kernel, handles this data co-ordination job.

The kernel moves data between different sorts of memory on the chip and elsewhere in the computer.

Computers are engaged in a constant battle to make sure the data you want is in the fastest memory possible at the time you need it.

When data is in the processor's own memory - the cache - it is managed by the processor but it is at this point that the newly revealed vulnerabilities come into effect.

Spectre essentially gets programs to perform unnecessary operations - this leaks data that should stay confidential.

Meltdown also grabs information - but it simply snoops on memory used by the kernel in a way that would not normally be possible.

Spectre exploits something called "speculative execution", which prepares the results of a set of instructions to a chip before they may be needed.

Those results are placed in one of the fastest bits of memory - on the computer's processor chip.

Unfortunately, security researchers have discovered that it is possible to manipulate this forward-looking system to get the processor to perform operations on memory that it wouldn't normally do.

Bit by bit, this technique could be used to reveal sensitive or important data.

How would a hacker target my machine?

An attacker would have to be able to put some code on to a user's computer in order to try to exploit either Meltdown or Spectre.

This could be done in a variety of ways, but one - running such code in a web browser - is already being closed off by companies such as Google and Mozilla.

Users can also, for example, use Chrome's "site isolation" feature to further protect themselves.

Some cyber-security experts have recommended blocking ads, browser scripts and page trackers as well.

Even if an attacker did get access, they would get only "snippets" of data from the processor that could eventually be pieced together to reveal passwords or encryption keys, says cyber-security expert Alan Woodward, at the University of Surrey.

That means the incentive to use Meltdown or Spectre will at first probably be limited to those prepared to plan and carry out more complex attacks, rather than everyday cyber-criminals.

Am I more at risk if I use cloud services?

Individuals are probably not at risk when they use cloud services, but the companies providing them are scrambling to work out all the implications Spectre and Meltdown have for them.

This is because of they way they organise cloud services.

Typically, they let lots of customers use the same servers and sophisticated software, "hypervisors", to keep data from different customers separate.

The two bugs imply that getting access to one cloud customer might mean that attackers can get at data from the others using the same central processing unit (CPU) on that server.

Many cloud services already run security software that looks out for these kinds of data pollution and sharing problems and these will now have to be improved to look out for these novel attacks.

Will my computer's performance be affected if I install a patch?

The patches for Meltdown involve getting the processor to repeatedly access information from memory - extra effort on its part that would not normally be necessary.

Doing this basically makes the processor work harder and some have estimated that performance dips of up to 30% could be observed.

Steven Murdoch, at University College London, explains that programs that rely on making many requests to the kernel will be most affected - but that is limited to specific types of program, such as those performing lots of database tasks.

Bitcoin mining, the computationally intensive procedure that confirms transactions on the virtual currency's network, may not be badly affected, he points out, as those processes don't involve lots of work for the kernel.

"For most people, I expect the loss of performance will not be particularly great, but it could be noticeable in some circumstances," he adds.

Are patches for both vulnerabilities available yet?

Patches for the Meltdown bug are already being released - Microsoft's Windows 10 patch comes out on Thursday, with updates for Windows 7 and 8 to follow in the next few days.

The latest version of Apple's macOS, 10.13.2, is patched, but earlier versions will need to be updated.

Patching Spectre is going to be harder because the weaknesses it exploits are used so widely on modern machines.

Processors try to break requests into multiple tasks they can deal with separately to gain any amount of speed improvement where they can, even on a small scale.

Many of the ways they do this look like they can be monitored via Spectre to gain information about what the chip is up to.

Patching this directly - essentially changing the way these chunks of silicon work - probably won't be attempted initially, but altering the way that other bits of software on computers work to prevent exploitation of Spectre should help limit the risk to users.

More worryingly, the researchers who found the bug said the "practicality" of producing fixes for existing processors was "unknown".

Forbes is maintaining an up-to-date list of the technology companies' patches and responses to Meltdown and Spectre.

Previous Post

Major security flaw found in Intel processors

Next Post

Meltdown and Spectre: All Macs, iPhones and iPads affected

Comments


Related Blogs

Blog Image
Tech

Intel and LG Bypass Vietnam for Billion-Dollar Projects


BY Jun Yuto
Blog Image
Tech

SplitX Summit: An Exclusive Gathering of XR, Metaverse, and Web3 Experts


BY Josip Nikolic
Blog Image
Tech

Schools warned over hackable heating systems


BY Lieze Van Riel
Blog Image
Tech

Intel faces backlash in China after banning products and labour from Xinjiang


BY Sofia Chew