Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Intel Introduces Protection Against Physical Fault Injection Attacks

Intel on Thursday announced Tunable Replica Circuit (TRC), a new fault injection protection in the 12th generation Intel Core processors, meant to identify non-invasive physical glitch attacks and electromagnetic fault injections.

Intel on Thursday announced Tunable Replica Circuit (TRC), a new fault injection protection in the 12th generation Intel Core processors, meant to identify non-invasive physical glitch attacks and electromagnetic fault injections.

Designed to complement existing software mitigations, TRC relies on hardware-based sensors to detect dynamic variations in circuits and can be fine-tuned to detect only timing violations that are caused by an attack.

“By changing the monitoring configuration and building the infrastructure to leverage the sensitivity of the TRC to fault injection attacks, the circuit was tuned for security applications,” Carlos Tokunaga, principal engineer in Intel Labs, said.

TRC is meant to deliver protections against certain types of physical attacks and can be calibrated for specific digital circuits, to detect timing failures caused by multiple environmental conditions, including clock, electromagnetic, temperature, or voltage glitches.

According to Daniel Nemiroff, senior principal engineer at Intel, fault injection attacks allow attackers to execute malicious instructions and potentially leak data through clock pin, electromagnetic, and voltage glitches.

“Software protections have hardened with virtualization, stack canaries and code authentication before execution. This has driven malicious actors to turn their attention to physically attacking computing platforms,” Nemiroff said.

TRC consists of a launching flip-flop (FF), a tunable delay chain, and a capture FF. The delay chain, Intel explains, can be calibrated per device, to ensure that TRC correctly determines the right timing of each cycle.

The tech giant also explains that calibration is the key to eliminating false-positives and that it has created a feedback-based calibration flow to help eliminate both false-positives and false-negatives.

Intel says it has applied the new protection to the Platform Controller Hub (PCH), a chipset that is isolated from the CPU and which is meant to improve the security of a system’s root of trust.

Because it is a digital device, TRC can be easily ported from one process node to another and uses a smaller die area compared to building both an analog clock monitor and analog voltage level detector, Intel explains in a technical paper.

Related: Intel Patches Severe Vulnerabilities in Firmware, Management Software

Related: ÆPIC Leak: Architectural Bug in Intel CPUs Exposes Protected Data

Related: Retbleed: New Speculative Execution Attack Targets Intel, AMD Processors

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Endpoint Security

The Zero Day Dilemma

Application Security

Less than a week after patching critical security defects affecting multiple enterprise-facing products, VMware is warning that one of the flaws is being exploited...