Researchers point to an AMD Backdoor, and face their own Backlash

in #hack6 years ago

When the Spectre and Meltdown vulnerabilities were revealed in millions of processors earlier this year, those deep-seated vulnerabilities rattled practically the entire computer industry. Presently a gathering of Israeli specialists is laying out another arrangement of chip-centered vulnerabilities that, if affirmed, would speak to another accumulation of imperfections at the center of PC equipment, this time in a processor engineering outlined by AMD. But the researchers now also face their own questions: about the hype they're piling onto those revelations, the timing of their disclosure to AMD, and even their financial motivations for their work.

vm-220343-e1497537320901.jpg

On Tuesday morning, hardware security firm CTS Labs published a paper and website pointing to four new classes of attack that the company says are possible against AMD chips in both PCs and servers. Together, they seem to offer an array of new methods for hackers who have already gained significant access to a computer running AMD's "Zen" processor architecture. At their worst, the vulnerabilities as described would allow attackers to bypass security safeguards against tampering with the computer's operating system, and potentially plant malware that evades practically any attempts to detect or delete it on AMD chips.

GettyImages-176900922.jpg

Coin Marketplace

STEEM 0.19
TRX 0.12
JST 0.028
BTC 63764.77
ETH 3430.37
USDT 1.00
SBD 2.53