Greek researchers who smashed Intel

Four researchers from the της Κολούμπια boffins δήλωσαν ότι μπορούν να κατασκοπεύσουν πληκτρολογήσεις και κλικ του ποντικιού από μια καρτέλα του προγράμματος περιήγησης στο web, υποκλέπτοντας τα caches του επεξεργαστή της Intel.Intel

The exploit is very effective against computers running its latest CPU models Intel, such as Core i7 processors, and works seamlessly in browsers with HTML5. So you can imagine we are talking about about 80 percent of the systems that are in circulation.

Ο Yossef Oren, The Simha Sethumadhavan and the Greeks, Vasilios KemerlisAnd Angelos Keromytis have discovered an attack that can be carried out with JavaScript served by a malicious ad network. It works by studying the time it takes to access the data stored in the last-level cache (the L3 cache is used by all kernels on a PC). Of these, they discover the user's activity.

Η έρευνα έχει ζητηθεί από πολλές μεγάλες όπως τις: Google, , Mozilla and Apple to update their browsers and stop the attack.

Dr Oren said:

“It's a low-cost attack that could probably be used by the bad guys for a short time (you know the ones that bombard you with pop-up ads). They could add this JavaScript to their popups. "

The work of the group was released to PDF, titled The Spy in the Sandbox - Practical Cache Attacks in JavaScript, and states that victims do not need to install any add-ons , simply visit a page that contains malicious JS.

Once the malicious JavaScript code starts working, it brings the cache to a known state, and waits for the user to press a key. He then uses a high timer of the browser to record the time it takes to move through a block of memory. With this information, the attacker can map the pattern of memory accesses for each keystroke and mouse movements, which can later be replayed.

With processor Intel Core i7 on a Mac OS X 10.10.2 and Firefox 35.0.1 browser, JS was able to map half the L3 cache in one minute, and about a quarter in about 30 seconds.

Research is of an academic nature, not a very practical one, but questions the hypothesis that most surveillance attacks should be in the immediate vicinity of their victims and execute arbitrary native code.

The team estimates that the attack works for every current Intel processor running HTML5. AMD chips can not be affected by cache design.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).