{"id":18345,"date":"2022-02-23T10:45:15","date_gmt":"2022-02-23T18:45:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/23\/news-12078\/"},"modified":"2022-02-23T10:45:15","modified_gmt":"2022-02-23T18:45:15","slug":"news-12078","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/23\/news-12078\/","title":{"rendered":"Inside the Lab Where Intel Tries to Hack Its Own Chips"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6210435398c5aa9edfd4d752\/master\/pass\/Security-Intel-Hacking-Lab_SHO1107.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 23 Feb 2022 12:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">&quot;Evil maid&quot; attacks<\/span> are a <a href=\"https:\/\/www.wired.com\/story\/do-not-disturb-app-macbook-evil-maid-attacks\/\">classic cybersecurity problem<\/a>. Leave a computer unattended in a hotel and an attacker dressed as an employee could enter your room, plant malware on your laptop, and slip out without leaving a trace. Allowing <a href=\"https:\/\/www.wired.com\/story\/thunderspy-thunderbolt-evil-maid-hacking\/\">physical access<\/a> <a href=\"https:\/\/www.wired.com\/2015\/03\/stealing-data-computers-using-heat\/\">to a device<\/a> is often game over. But if you&#x27;re building processors that end up in millions of devices around the world, you can&#x27;t afford to give up so easily.<\/p>\n<p class=\"paywall\">That&#x27;s why five years ago Intel launched a dedicated hardware hacking group known as Intel Security Threat Analysis and Reverse Engineering. About 20 iSTARE researchers now work in specially equipped labs in the northern Israeli city of Haifa and in the US. There, they analyze and attack Intel&#x27;s future generations of chips, looking for soft spots that can be hardened long before they reach your PC or MRI machine.<\/p>\n<p class=\"paywall\">\u201cPeople don\u2019t always quite understand all the security implications and may feel like physical attacks aren\u2019t as relevant,\u201d says Steve Brown, a principal engineer in Intel&#x27;s product assurance and security department. \u201cBut this is a proactive approach. The earlier you can intercept all of this in the life cycle the better.\u201d<\/p>\n<p class=\"paywall\">When hackers exploit vulnerabilities to steal data or plant malware, they usually take advantage of software flaws, mistakes, or logical inconsistencies in how code is written. In contrast, hardware hackers rely on physical actions; iSTARE researchers crack open computer cases, physically solder new circuits on a motherboard, <a href=\"https:\/\/www.wired.com\/story\/electromagnetic-pulse-hack\/\">deliver strategic electromagnetic pulses<\/a> to alter behavior as electrons flow through a processor, and measure whether physical traits like heat emissions or vibrations <a href=\"https:\/\/www.wired.com\/story\/what-is-side-channel-attack\/\">incidentally leak information<\/a> about what a device is doing.<\/p>\n<p class=\"paywall\">\u201cIt\u2019s about the fun of breaking things.\u201d\u00a0<\/p>\n<p class=\"paywall\">Uri Bear, iStare<\/p>\n<p class=\"paywall\">Think about the security line at the airport. If you don&#x27;t have ID, you could work within the system and try to sweet-talk the TSA agent checking credentials, hoping to manipulate them into letting you through. But you might instead take a physical approach, finding an overlooked side entrance that lets you bypass the ID check entirely. When it comes to early schematics and prototypes of new Intel chips, iSTARE is trying to proactively block any routes that circumnavigators could attempt to use.<\/p>\n<p class=\"paywall\">\u201cWe basically emulate the hacker, figuring out what would they want to get out of an attack,\u201d says Uri Bear, iSTARE&#x27;s group manager and a senior security analyst for Intel&#x27;s product assurance and security department. \u201cWe\u2019re not tasked with just finding security vulnerabilities, we\u2019re also tasked with developing the next generation of attacks and defenses and making sure we are ready for the next thing that will come. We fix things ahead of time, before they\u2019re in the market.\u201d<\/p>\n<p class=\"paywall\">The mind-bending thing about hardware hacking is that software can also play a role. For example, physics-based <a href=\"https:\/\/www.wired.com\/2015\/03\/google-hack-dram-memory-electric-leaks\/\">\u201cRowhammer\u201d attacks<\/a> famously use little software programs running over and over again to <a href=\"https:\/\/www.wired.com\/2016\/08\/new-form-hacking-breaks-ideas-computers-work\/\">cause a leak of electricity<\/a> in a computer&#x27;s memory. That strategic glitch physically alters data in such a way that hackers can gain more access to the system. It\u2019s an example of the <a href=\"https:\/\/www.wired.com\/story\/rowhammer-ecc-memory-data-hack\/\">type of paradigm shift<\/a> that iSTARE researchers are <a href=\"https:\/\/www.wired.com\/story\/rowhammer-half-double-attack-bit-flips\/\">trying to presage<\/a>.<\/p>\n<p class=\"paywall\">\u201cIt\u2019s about the fun of breaking things,\u201d Bear says, \u201cfinding ways to use hardware that was either blocked or that it was not designed for and trying to come up with new usages. If there were no hackers, everything would be stale and just good enough. Hackers challenge the current technology and force designers to make things better.\u201d<\/p>\n<p class=\"paywall\">Working in cramped labs stuffed with specialized equipment, iSTARE vets schematics and other early design materials. But ultimately the group is at its most effective when it reverse engineers, or works backward from, the finished product. The goal is to probe the chip for weaknesses under the same conditions an attacker would\u2014albeit with prototypes or even virtualized renderings\u2014using tools like electron microscopes to peer inside the processor&#x27;s inner workings. And while iSTARE has access to top-of-the-line analysis equipment that most digital scammers and criminal hackers wouldn&#x27;t, Bear emphasizes that the cost of many advanced analysis tools has come down and that motivated attackers, particularly state-backed actors, can get their hands on whatever they need.<\/p>\n<p class=\"paywall\">iSTARE operates as a consulting group within Intel. The company encourages its design, architecture, and development teams to request audits and reviews from iSTARE early in the creation process so there&#x27;s actually time to make changes based on any findings. Isaura Gaeta, vice president of security research for Intel\u2019s product assurance and security engineering department, notes that in fact iSTARE often has more requests than it can handle. So part of Gaeta and Brown&#x27;s work is to communicate generalizable findings and best practices as they emerge to the different divisions and development groups within Intel.<\/p>\n<p class=\"paywall\">Beyond Rowhammer, chipmakers across the industry have faced other recent setbacks in the security of core conceptual designs. Beginning in 2016, for example, Intel and other manufacturers began <a href=\"https:\/\/www.wired.com\/story\/critical-intel-flaw-breaks-basic-security-for-most-computers\/\">grappling with unforeseen security weaknesses<\/a> of \u201cspeculative execution.\u201d It\u2019s a speed and efficiency strategy in which processors would essentially make educated guesses about what users might ask them to do next and then work ahead so the task would already be in progress or complete if needed. <a href=\"https:\/\/www.wired.com\/story\/intel-mds-attack-speculative-execution-buffer\/\">Research<\/a> <a href=\"https:\/\/www.wired.com\/story\/speculative-store-bypass-spectre-meltdown-vulnerability\/\">exploded<\/a> into attacks that could grab troves of data from this process, even in the most <a href=\"https:\/\/www.wired.com\/story\/foreshadow-intel-secure-enclave-vulnerability\/\">secure chips<\/a>, and companies <a href=\"https:\/\/www.wired.com\/story\/intel-zombieload-third-patch-speculative-execution\/\">like Intel<\/a> struggled to release adequate fixes on the fly. Ultimately, chips needed to be fundamentally rearchitected to address the risk.<\/p>\n<p class=\"paywall\">Around the same time that researchers would have disclosed their initial speculative execution attack findings to Intel, the company formed iSTARE as a reorganization of other existing hardware security assessment groups within the company. In general, chipmakers across the industry have had to substantially overhaul their auditing processes, vulnerability disclosure programs, and funding of both internal and external security research in response to the <a href=\"https:\/\/www.wired.com\/story\/meltdown-spectre-costs-of-unchecked-innovation\/\">Spectre and Meltdown speculative execution revelations<\/a>.<\/p>\n<p class=\"paywall\">\u201cA few years back, maybe a decade back, the vendors were much more reluctant to see that hardware, just like software, will contain bugs and try to make sure that these bugs are not in the product that the customers then use,\u201d says Daniel Gruss, a researcher at Graz University of Technology in Austria.<\/p>\n<p class=\"paywall\">Gruss was on one of the <a href=\"https:\/\/www.wired.com\/story\/meltdown-spectre-bug-collision-intel-chip-flaw-discovery\/\">original academic teams<\/a> that discovered Spectre and Meltdown. He says in recent years Intel has funded some of the PhD students in his lab, TU Graz&#x27;s Secure Systems Group, though none of his students is currently funded by Intel.<\/p>\n<p class=\"paywall\">\u201cFinding vulnerabilities is a creative job, to some extent. You have to think about the hardware and software in ways others haven\u2019t,\u201d Gruss says. \u201cI think it was a necessary step for vendors to create these teams or increase the sizes and budgets of them. But they won\u2019t replace the massive scale of creativity you can find in academia, which is just so many more brains than you can hire in one red team.\u201d<\/p>\n<p class=\"paywall\">The iSTARE team says they feel acutely the responsibility of working on projects that will end up as ubiquitous Intel chips. And they must also live with the reality that some flaws and vulnerabilities will always slip by.<\/p>\n<p class=\"paywall\">\u201cIt can be frustrating,\u201d Brown says. \u201cFrom a researcher\u2019s point of view, you want to do the best you can, but there are times when maybe it wasn\u2019t enough or the assumptions changed along the way that then create a different vulnerability or weakness in a product that wasn\u2019t necessarily considered. But as those things are revealed, we learn more to make the next product better. So we try to take it in a positive form, though it may be sometimes in a negative light.\u201d<\/p>\n<p class=\"paywall\">Independent hardware hacker Ang Cui, founder of the embedded device security firm Red Balloon, says that groups like iSTARE are vital to large chip manufacturers, whose products power computation in every industry and government. \u201cGroups like this have been around since man first used a paperclip to glitch a computer,\u201d he says. But he argues that manufacturers have economic incentives that generally don\u2019t align with maximum security, a challenging dynamic for a group like iSTARE to transcend.<\/p>\n<p class=\"paywall\">\u201cChip vendors have to add extra features and bells and whistles so they can sell new, shiny things to the market, and that translates to billions more transistors on a chip,\u201d Cui says. \u201cSo you&#x27;re adding known and unknown vulnerabilities to this very complicated piece of hardware, and adding more and more things for these teams to defend against.\u201d<\/p>\n<p class=\"paywall\">When it comes to sharing the findings of its forward-looking research, Brown says iSTARE doesn&#x27;t pull punches.<\/p>\n<p class=\"paywall\">\u201cIt could be fairly adversarial\u2014you\u2019re finding issues and somebody else is the product owner, that can be kind of a contentious relationship,\u201d Brown says. \u201cBut we try to approach it as if we\u2019re part of those teams and that we have as much at stake as they do versus just pointing out deficiencies in their products.\u201d<\/p>\n<p class=\"paywall\">Security and privacy auditors can often seem like unwelcome Cassandras in large organizations, always nitpicking and finding problems that create more work for everyone. Bear agrees that part of iSTARE&#x27;s job is to be aware of this dynamic and deliver findings tactfully.<\/p>\n<p class=\"paywall\">\u201cI think the solution is not to find a problem and throw it at somebody,&quot; he says. \u201cIt\u2019s working on the solution together. That\u2019s a huge part of the acceptance of issues that need solving.\u201d<\/p>\n<p class=\"paywall\">Gaeta emphasizes that by catching security issues while there&#x27;s still time to fix them, iSTARE saves Intel and its customers money and the reputational damage that comes from major systemic security vulnerabilities. This is ultimately where the interests align between a tech behemoth like Intel and the creative, endlessly curious, pain-in-the-ass hackers needed for a team like iSTARE.<\/p>\n<p class=\"paywall\">\u201cEvery few months we change completely in our heads the item that we are working on,\u201d Bear explains. \u201cIt\u2019s a new technology, it\u2019s a new processor type, a new command set, a new manufacturing technology, and there are lots of tedious details. So we\u2019ve got to keep it fun because really security researchers do this for fun. I\u2019m paid to break other people\u2019s toys, that&#x27;s how I explain it.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/intel-lab-istare-hack-chips\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6210435398c5aa9edfd4d752\/master\/pass\/Security-Intel-Hacking-Lab_SHO1107.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 23 Feb 2022 12:00:00 +0000<\/strong><\/p>\n<p>Researchers at iSTARE have to think like the bad guys, finding critical flaws before processors go to production.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18345","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18345"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18345\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18345"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}