innovator

Add idea


Calendar

«    April 2019    »
MonTueWedThuFriSatSun
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
 

 

Advert

 

Payment

 

Advert

 

Authorization

Стартап

DateDate: 1-04-2019, 08:45

An international team of researchers from Kaiserslautern University of Technology (Germany) and Stanford University (USA) have developed a new algorithm to identify vulnerabilities in the components of the processes before they are released in mass production.
The new development, called the Unique Verification of Program Execution (UPEC), analyzes the "side effects of the microarchitecture design and determines whether it is possible to exploit them to create hidden channels." As part of testing, the team examined several new vulnerabilities. According to them, problems arising from design flaws can consist of almost any processor, not just high-end processors, as is the case with the Specter / Meltdown vulnerable classes.
"The key point is that even simple design solutions, such as adding or removing a buffer, can lead to the appearance of the vulnerability of almost any processor," the researchers noted.
With the help of a new specialist algorithm, it was possible to identify a number of new vulnerabilities in current processors. The orc, in which many processes are involved, is used in devices from the Internet of Things areas and unmanned vehicles. Theoretically, with the help of an attack, Orc attackers could take control of autonomous transport or a network of IoT devices.
Scientists believe that this vulnerability may be related to commercial products, but cannot be approved for sure, because it does not have access to the original text. A detailed report on the algorithm of work. UPEC researchers intend to present at the DATA-2019 conference, which will be held on March 27 in Italy.
Source: securitylab.ru