The Spectre and Meltdown side-channel security flaws that became public in January and shook the processor industry put a bullseye on Intel more than other chipmakers and forced the company to take the lead in addressing the need for greater security measures at the silicon level.
After initial stumbles, Intel issued a series of patches and microcode to address the vulnerabilities in its microprocessors that were discovered by Google, and at the CES 2018 show that month and in a couple of open letters issued later, CEO Brian Krzanich promised a "security-first" approach for the company's chips. (See Intel Will Leave Some Chips Without Spectre Patch.)
That silicon-level security approach has been evident this week in a series of announcements the chip maker made at the RSA 2018 Conference in San Francisco.
Among the new technologies Intel introduced was its Threat Detection Technology, designed to help systems more quickly detect advanced cyber threats, and included Accelerated Memory Scanning, which offloads the compute-intensive job of scanning for memory-based threats from the CPU to an integrated GPU.
The move is designed to improve the capability of systems to detect such exploits while significantly reducing the heavy tax on the performance and power consumption of the CPU cores. Early benchmarks of the technology showed CPU utilization dropping from 20% to a little as 2%, Rick Echevarria, vice president of Intel's Software and Services Group and general manager of its Platforms Security Division, wrote in a post on the company blog.
Microsoft officials said the software maker is integrating the Accelerated Memory Scanning technology into the antivirus capability of its Microsoft Windows Defender Advanced Threat Protection (ATP) offering in systems running on Intel's 6th-, 7th- and 8th-generation Core processors.
Intel's decision to move memory scanning to GPUs makes sense, Patrick Moorhead, principal analyst with Moor Insights and Strategy, told Security Now in an email.
"GPUs are best at very highly parallelized, simple tasks and this is exactly what memory scanning are all about," Moorhead wrote, adding that it will deliver "a huge improvement over CPU-only. This demonstrates that Intel is choosing security over pushing CPU performance. Intel for years was an 'x86 CPU' house and pretty much all roads led to a CPU. Now with the Altera, Nervana, Movidius and MobilEye acquisitions, times are changing as Intel has embraced heterogeneous computing. Intel could have chosen not to offload the very capable CPU over a GPU, but instead chose the best technical solution to better secure the platform."
Intel's security push
Another part of the Threat Detection Technology introduction was Advanced Platform Telemetry, which draws on machine learning algorithms with platform telemetry to not only improve the detection of advanced threats but also reduce false positives and reduce the impact on system performance.
Cisco is putting the technology into its Tetration data center and cloud security platform for systems powered by Intel's Skylake Xeon Scalable Processors.
Intel also launched Intel Security Essentials, which are designed to drive a consistent set of root-of-trust hardware security capabilities across Intel's Core, Intel Xeon and Intel Atom processor platforms.
"These capabilities are platform integrity technologies for secure boot, hardware protections (for data, keys and other digital assets), accelerated cryptography and trusted execution enclaves to protect applications at runtime," Echevarria wrote in his blog post. "This standard set of capabilities will accelerate trusted computing as customers build solutions rooted in hardware-based protections."
Moorhead noted that the partnerships with vendors such as Microsoft and Cisco are important in security, where the more data a company has to work with, the quicker the industry as a whole can address and prevent issues before damage is done.
The analyst also applauded Intel's response to the Spectre and Meltdown vulnerabilities, particularly given that it was Intel that was first linked to the security flaws, even though they impacted competitors as well. Essentially, by exploiting the flaws in the chips, hackers can access the operating system's kernel memory.
The weak link is the way the chips handle "speculative execution," which is done to increase performance by predicting the path of a particular task to find the fastest way to complete it.
"It affected Arm, AMD and Intel, yet Intel took the brunt of the public scorn," Moorhead wrote. "Intel then over-communicated to a fault, which thrust them again and again into the spotlight. They also communicated on behalf of other companies like Apple, Microsoft Azure, and GCP [Google Cloud Platform]. Note there have been no verified attacks or damage done. The final impactful thing Intel did was to form a division, reporting into [Krzanich], that can throw yellow flags and delay architectures and products. This is a big deal."
— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.