Northwest Arkansas Democrat-Gazette

Intel faces scrutiny over computer chip security flaw

- DON CLARK

SAN FRANCISCO — In 1994, Intel faced a public relations crisis over an elusive mathematic­s glitch that affected the accuracy of calculatio­ns made by its popular Pentium computer chips. After insisting that the problem would not affect many people, the company succumbed to public pressure and recalled the chips, costing it $475 million.

Now Intel faces an even bigger test: two serious security issues with its chips that could have implicatio­ns for nearly everyone touched by computing. And so far — in something of a repeat of the 1994 incident — Intel has failed to quiet critics, putting it in an awkward position this week as its chief executive prepares to take the stage at one of the world’s biggest tech trade shows.

The cause of the new public relations crisis is the disclosure last week of two new ways to filch data from the microproce­ssors inside nearly all of the world’s computers. Called Meltdown and Spectre, they could allow hackers to steal the entire memory contents of computers and spur the discovery of new attacks.

“It is a very big deal, because it’s an area people haven’t looked at before,” said Bruce Schneier, a computer security expert and lecturer at the John F. Kennedy School of Government at Harvard. “Everybody is going to start now.”

Intel was privately informed of the issues by security researcher­s in June. The company, which has rejected doing a chip recall or other costly remedies, said it has quietly marshaled a coalition of software, hardware and cloud services to develop and deploy programmin­g tweaks that are designed to close most of the security gaps. Intel and its partners said the fixes should be largely in place this week.

“We’ve gotten much more mature in our ability to respond,” said Steven Smith, an Intel vice president who was closely involved in the Pentium crisis and is now overseeing its handling of the new security issues.

But just how well the proposed fixes work remains a matter of debate, putting Brian Krzanich, Intel’s chief executive, in the hot seat. Krzanich is scheduled to help kick off the Internatio­nal Consumer Electronic­s trade show, one of the biggest tech convention­s of the year, at a Las Vegas hotel tonight. Now he may need to address the chip security problems in addition to topics like artificial intelligen­ce, virtual reality and self-driving cars.

Meltdown and Spectre were identified by a team at Google, with their work augmented by researcher­s from other organizati­ons. Meltdown affects only Intel chips. Spectre also affects chip designs from companies such Advanced Micro Devices and ARM Holdings, whose technology is used in most smartphone­s.

Intel, largely by virtue of its success, has the most at stake. While the Pentium chip underpinne­d most PCs running Microsoft operating systems in 1994, Intel processors are now also used in all Apple Macintosh systems and more than 95 percent of the chips used by cloud services and data centers run by corporatio­ns.

Its technologi­cal reach means that both Meltdown and Spectre could affect just about anyone who uses the Internet.

“We created a microproce­ssor monocultur­e,” said Bryan Cantrill, chief technology officer at Joyent, a cloud service owned by Samsung. “There are dangers associated with that.”

Intel’s situation is complicate­d by history and semantics. The Pentium problem was caused by a design error. But Meltdown and Spectre attacks exploit a common speed-boosting technique in chips called speculativ­e execution that Intel’s Smith insisted is working as it should. That approach to chip design emerged before researcher­s developed new ways to spy on such internal operations, using what they call “side-channel” analysis, Smith said.

As a result, the security issues that were discovered were not flaws or bugs, he said. The features that hackers could exploit are a bit like a door or window in a house, which burglars can exploit but that builders would not consider leaving out.

That hasn’t stopped an uproar from security researcher­s and tech industry executives. One widely distribute­d barb came from Linus Torvalds, the creator of the Linux operating system, who posted a testy message last week advising Intel to “take a long hard look” at its chips “and actually admit that they have issues instead of writing PR blurbs that say that everything works as designed.”

Major users of Intel chips — including Apple and the cloud computing arms of Google and Amazon — have said they deployed security fixes recommende­d by Intel and so far they have not reported the sharp performanc­e slowdowns of the sort some experts projected.

But the solutions are far from perfect. While Meltdown’s effects can be mitigated with updated operating systems, countering Spectre requires more complex steps like updating computer code stored in the chips themselves — or in some applicatio­ns like web browsers, Intel recommends inserting special instructio­ns in places that security profession­als said may be hard to identify.

Smith said Intel and its partners had originally planned to disclose the security problems and their proposed solutions on Tuesday, before the news was broken last week in The Register, a tech publicatio­n. Smith said the company did not disclose the issues when they were informed of them in June because Intel needed time to analyze the issues and then develop and test remedies.

Newspapers in English

Newspapers from United States