PC Pro

Echoes of Spectre and Meltdown

-

Side-channel attacks such as GoFetch are not that common in the real world for the reasons stated previously – there’s usually an easier way. “A side-channel attack basically is something that uses a side effect of legitimate functional­ity to expose small bits of informatio­n that can then be pieced together,” said Malwarebyt­es’ Reed.

Consequent­ly, most vulnerabil­ities tend to be uncovered in the lab, rather than actively used by nefarious actors. Over the years researcher­s have come up with novel and amusing ways that a side-channel attack could conceivabl­y leak data out. For example, it’s possible that malware could use the pattern of blinks of an LED or the sounds created by the hard disk being scratched to exfiltrate data. But unsurprisi­ngly, these would be very difficult to pull off in the real world.

Neverthele­ss, the risks from side-channel attacks are still taken extremely seriously by cybersecur­ity profession­als – and as with

GoFetch, occasional­ly there are vulnerabil­ities uncovered that do spark serious concerns. For example, in 2018 two vulnerabil­ities emerged called Spectre and Meltdown. Both worked in slightly different ways, but it was discovered that the problem could conceivabl­y affect processors made by all of the largest players: Intel, AMD and ARM.

As a result, patches were quickly issued to all of the major operating systems – even though, especially in the case of Meltdown, there were performanc­e trade-offs to be made.

 ?? ?? Side-channel attacks come in many forms, including listening to hard disks
Side-channel attacks come in many forms, including listening to hard disks

Newspapers in English

Newspapers from United Kingdom