Vulnerabilities / Threats

02:00 PM
Ketan Shah
Ketan Shah
Connect Directly
E-Mail vvv

Side-Channel Attacks & the Importance of Hardware-Based Security

Reliably evaluating the security of modern infrastructure requires a solid understanding of the hardware supporting it.

The recent Meltdown and Spectre vulnerabilities found in CPUs are notable for many reasons and provide good lessons to everyone. These vulnerabilities exist in the CPU hardware and are a type of sophisticated attack known as a "side-channel attack." Discovered by hardware security experts, these attacks remind us that reliably evaluating the security of modern infrastructure requires a solid understanding of the hardware supporting that infrastructure.

Hardware-Based Security
Hundreds of billions of dollars have been spent on software-only malware detection, virus scanners, firewalls, and more, none of which detected these vulnerabilities. Software security tools will never be able to provide protection if the foundational hardware is insecure. Operating systems, hypervisors, and software security tools are not enough to keep applications secure. A new approach is needed that provides security from the hardware to the cloud.

As companies move to the public cloud, they face a shared responsibility model for security with the provider responsible for infrastructure security and the user responsible for application security. As organizations put workloads or data in the public cloud, it is often on shared infrastructure that is virtualized with multiple tenant virtual machines occupying the same system. Yet organizations are left with having little control over the risks of such a system.

One approach organizations can consider is to leverage trusted execution environments (TEEs) to run applications in a completely isolated execution environment called a secure enclave. Chances are you have used an Apple device with this approach — Touch ID and other sensitive data is all stored encrypted inside a secure enclave isolated from rest of the system. Technologies such as Intel SGX are the cloud equivalent of that. SGX enables applications to run in a completely isolated execution environment — a secure enclave. No other software component, not even those running with higher privilege levels, can access the enclave memory.

End-to-End Encryption
Encryption remains the most effective tool to protect data. Encrypted data is unintelligible even when disclosed. The mathematical nature of encryption trusts nothing. Mathematics is easy to analyze and hard to defeat. Encryption can most readily be deployed to secure data at rest. Tools such as PGP and BitLocker ensure that if someone steals your hard drive, the data remains protected. Similarly, encryption can be used to secure data in motion. Transport Layer Security (TLS) ensures that your communication with your favorite e-commerce website is protected from disclosure or modification.

Until recently, data in use was the window where data remained exposed, due to a lack of solutions for encryption of data in use. New technologies are emerging for protecting data in use or the application runtime. These runtime encryption solutions keep data encrypted even when held in the application's in-memory data structures, or when actively being used for computation. (Full disclosure: Fortanix delivers runtime encryption solutions; however, other solutions that leverage TEEs and provide data in use protection can also address this problem.)

By combining runtime encryption of data in use with TEEs such as Intel SGX, organizations can now perform secure computation on data in an untrusted environment, without exposing the data. By keeping data encrypted outside enclaves, runtime encryption reduces the scope of attacks because any attack that accesses data outside an enclave will get only encrypted data, which is unreadable without proper decryption keys. Even with a compromised system, hackers will not have access to sensitive data. In that way, runtime encryption would have protected applications against a Meltdown attack.

Responsibility of Technology Providers
The cloud and systems providers were very responsive in addressing the CPU vulnerabilities in a coordinated manner. Until the end of 2018, both Intel and Microsoft are running bug bounty programs focused specifically on side-channel vulnerabilities with a maximum reward of $250,000. Such collaboration between security researchers and vendors is designed to best protect customers.

Beyond the patching and the incentives, though, it is time to recognize the challenges inherent in cloud computing and accelerate innovation and adoption of technologies that enable new levels of isolation, privacy, and confidentiality between multiple tenants occupying the same system. Hardware chip providers have an important role to fuel the innovation with a hardware root of trust. Cloud providers need to be at the forefront in making these technologies available.

Finally, any innovation needs to focus on how to make these technologies easy to consume and have a minimal learning curve for application developers building agile cloud applications. Security should not become an inhibitor to the business, even when the stakes are this high.

Related Content:

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information


Ketan Shah is an entrepreneurial product leader with 20+ years of functional experience that spans product management, business operations, go-to-market, and product development. In his career, at both startups and publicly traded companies, he has launched several new ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
[email protected],
User Rank: Apprentice
6/7/2018 | 3:42:46 PM
Side Channel Attack
Side channel attacks in a hardware panel is a very vital thing. Hardware is very sensitive when side channel is attacked in the hardware. So if anyone wants to know any new side channels attacks in the hardware things you may visit Netgear Genie support. Here thoroughly discussed various attacks and al related possibilities.
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.