Friday, January 15, 19:22
Home security Intel is bringing CET technology to Tiger Lake's CPU

Intel is bringing CET technology to Tiger Lake's CPU

Intel announced today that its experimental CET security feature will be available for the first time on Tiger Lake's upcoming portable CPUs.

Tiger Lake Intel CPU

Intel has been working at CET, which has been using Control-flow Enforcement Technology since 2016, when it first published the first version of CET.

As its name implies, CET deals with "control flow", a technical term used to describe the order in which operations are performed within the CPU.

Malware running on a device can use vulnerabilities in other applications to violate their control flow and enter its malicious code to run within another application.

In the future Tiger Lake CPU for mobile devices Intel's CET will protect the flow of control through two new security mechanisms, called shadow stack and indirect branch monitoring.

Shadow stack refers to the creation of a copy of the projected control flow of an application, its storage shadow stack in a secure area of ​​the CPU and its use to ensure that unauthorized changes are not made to the intended execution order of an application.

Intel says the CET shadow stack will protect users from a technique called Return Oriented Programming (ROP), where malware abuses the RET (return) command to attach its malicious code to the application's legal control stream.

On the other hand, the technique "indirect branch trackingRefers to limiting and adding additional protections to an application's ability to use CPU "jump tables", which are tables containing memory locations (re) used throughout an application's control flow.

Intel says indirect branch tracking protects against two techniques called Jump Oriented Programming (JOP) and Call Oriented Programming (COP), where malware abuses JMP or CALL instructions to invade the application's legitimate jump tables. .

Because Intel released the CET specification in 2016, software developers had time to customize their code for the first line of Intel processors to support it.

CET support has already been converted to Glibc, and Microsoft has also added CET support to Windows Insiders, with the feature called Stack Protection.

All you need now is for Intel to release processors that support CET instructions, and therefore applications that are functional. systems they can activate the support and select the protection provided by CET.

CET released today for Intel's portable CPU series that use Tiger Lake microarchitecture, but the technology will also be available in desktop platforms and server, said Tom Garrison, vice president of Client Computing Group and director general of security and initiative strategies (SSI) at Intel Corporation.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

Android: How to see which apps have access to your site

It's no secret that smartphone apps have access to many permissions - if you let them. It is important to make sure ...

Canon lets you take pictures from space

Instead of releasing new cameras for CES 2021, Canon is doing something different: It lets you take pictures from space ....

Wikipedia vs Big tech: Who fights misinformation?

As Election Day turned into US Election Week, Facebook, Twitter and YouTube were trying to prevent ...
00:02:36

Tesla: It is called to recall cars due to problematic screens

The touch screen in some Tesla cars seems to have a problem, which could ...

Ransomware is responsible for half of all data breaches in hospitals

Almost half of the data breaches committed in hospitals and the wider healthcare sector are due to ransomware attacks, ...

Astronomers have just found the oldest oversized black hole

A quasar was discovered in a dark corner of space - over 13,03 billion light-years away - and contains a ...

What are the best and most affordable 5G phones for 2021

The market will soon be flooded with mid-range 5G devices. Everything that happens will be really exciting: you will be able to ...

Verified Twitter accounts in a cryptocurrency scam with the name of Elon Musk violated!

Lately, hackers have been violating verified Twitter accounts in a cryptocurrency giveaway scam, in which the name of the CEO is used ...

Classiscam: Fraudsters "fake" brands and deceive users of European markets!

Dozens of criminal gangs publish fake ads in popular online markets, to attract unsuspecting users to "fraudulent" commercial sites or phishing ...

iOS 14.4: Displays a notification for repairs with non-genuine cameras

Starting with the iPhone 11, Apple has added a notification to iOS that tells the user when the device has a ...