Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud Security

// // //
4/19/2018
08:05 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt

In Wake of Spectre & Meltdown, Intel Shifts Memory Scanning to GPU

At the RSA Conference this week, Intel introduced several silicon-level security technologies, including moving memory scanning from the CPU to the GPU, as part of its larger 'security-first' strategy following the Spectre and Meltdown issues.

The Spectre and Meltdown side-channel security flaws that became public in January and shook the processor industry put a bullseye on Intel more than other chipmakers and forced the company to take the lead in addressing the need for greater security measures at the silicon level.

After initial stumbles, Intel issued a series of patches and microcode to address the vulnerabilities in its microprocessors that were discovered by Google, and at the CES 2018 show that month and in a couple of open letters issued later, CEO Brian Krzanich promised a "security-first" approach for the company's chips. (See Intel Will Leave Some Chips Without Spectre Patch.)

That silicon-level security approach has been evident this week in a series of announcements the chip maker made at the RSA 2018 Conference in San Francisco.

Among the new technologies Intel introduced was its Threat Detection Technology, designed to help systems more quickly detect advanced cyber threats, and included Accelerated Memory Scanning, which offloads the compute-intensive job of scanning for memory-based threats from the CPU to an integrated GPU.

The move is designed to improve the capability of systems to detect such exploits while significantly reducing the heavy tax on the performance and power consumption of the CPU cores. Early benchmarks of the technology showed CPU utilization dropping from 20% to a little as 2%, Rick Echevarria, vice president of Intel's Software and Services Group and general manager of its Platforms Security Division, wrote in a post on the company blog.

Microsoft officials said the software maker is integrating the Accelerated Memory Scanning technology into the antivirus capability of its Microsoft Windows Defender Advanced Threat Protection (ATP) offering in systems running on Intel's 6th-, 7th- and 8th-generation Core processors.

Intel's decision to move memory scanning to GPUs makes sense, Patrick Moorhead, principal analyst with Moor Insights and Strategy, told Security Now in an email.

"GPUs are best at very highly parallelized, simple tasks and this is exactly what memory scanning are all about," Moorhead wrote, adding that it will deliver "a huge improvement over CPU-only. This demonstrates that Intel is choosing security over pushing CPU performance. Intel for years was an 'x86 CPU' house and pretty much all roads led to a CPU. Now with the Altera, Nervana, Movidius and MobilEye acquisitions, times are changing as Intel has embraced heterogeneous computing. Intel could have chosen not to offload the very capable CPU over a GPU, but instead chose the best technical solution to better secure the platform."

Intel's security push
Another part of the Threat Detection Technology introduction was Advanced Platform Telemetry, which draws on machine learning algorithms with platform telemetry to not only improve the detection of advanced threats but also reduce false positives and reduce the impact on system performance.

Cisco is putting the technology into its Tetration data center and cloud security platform for systems powered by Intel's Skylake Xeon Scalable Processors.

Intel also launched Intel Security Essentials, which are designed to drive a consistent set of root-of-trust hardware security capabilities across Intel's Core, Intel Xeon and Intel Atom processor platforms.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

"These capabilities are platform integrity technologies for secure boot, hardware protections (for data, keys and other digital assets), accelerated cryptography and trusted execution enclaves to protect applications at runtime," Echevarria wrote in his blog post. "This standard set of capabilities will accelerate trusted computing as customers build solutions rooted in hardware-based protections."

Moorhead noted that the partnerships with vendors such as Microsoft and Cisco are important in security, where the more data a company has to work with, the quicker the industry as a whole can address and prevent issues before damage is done.

The analyst also applauded Intel's response to the Spectre and Meltdown vulnerabilities, particularly given that it was Intel that was first linked to the security flaws, even though they impacted competitors as well. Essentially, by exploiting the flaws in the chips, hackers can access the operating system's kernel memory.

The weak link is the way the chips handle "speculative execution," which is done to increase performance by predicting the path of a particular task to find the fastest way to complete it.

"It affected Arm, AMD and Intel, yet Intel took the brunt of the public scorn," Moorhead wrote. "Intel then over-communicated to a fault, which thrust them again and again into the spotlight. They also communicated on behalf of other companies like Apple, Microsoft Azure, and GCP [Google Cloud Platform]. Note there have been no verified attacks or damage done. The final impactful thing Intel did was to form a division, reporting into [Krzanich], that can throw yellow flags and delay architectures and products. This is a big deal."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file