Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs

Anil Rao, Intel’s vice president and general manager of systems architecture and engineering, says the opportunity for Intel and Google engineers to work as a team was particularly fruitful. The group had regular meetings, collaborated to track findings jointly, and developed a camaraderie that motivated them to bore even deeper into TDX.

Of the two vulnerabilities the researchers found that Rao called “critical,” one related to loose ends from a cryptographic integrity feature that had been dropped from the product. “It was a leftover thing that we didn’t catch, but the Google team caught it,” he says. The other major vulnerability uncovered by the project was in Intel’s Authenticated Code Modules, which are cryptographically signed chunks of code that are built to run in the processor at a particular time. The vulnerability involved a small window in which an attacker could have hijacked the mechanism to execute malicious code.

“For me, that was something which was surprising. I wasn’t expecting that we had such a vulnerability in our internal system,” Rao says. “But I was super happy that this team caught it. It’s not that these are easy vulnerabilities for someone to tap into, but the fact that it’s there is not a good thing. So at least once we fix it then we can sleep better at night.”

Rao and Porter also point out that the finding was significant because ACM is used in other Intel security products beyond TDX.

Additionally, as part of the collaboration, Google worked with Intel to open source the TDX firmware, low-level code that coordinates between hardware and software. This way, Google Cloud customers and Intel TDX users around the world will have more insight into the product.

“Confidential computing is an area where we are opening up and telling customers, ‘bring your most sensitive applications, bring your most sensitive data, and operate it on shared infrastructure in the cloud,’” Rao says. “So we want to make sure that we follow a rigorous process in ensuring that the key handlers of that sensitive data are rugged. Whether we like it or not, establishment of trust takes a long time, and you can break it very easily.”

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Best Portable Tire Inflators for 2022 thumbnail

Best Portable Tire Inflators for 2022

Waiting on the road for assistance can be frustrating, especially when you can fix a flat tire problem or low tire pressure issue yourself. All you need are the right tools to get the job done. If you happen to find yourself somewhere with a low or flat tire, a portable tire inflator is a bit…
Read More
SkyShowtime to the Netherlands in 2022: you need to know this thumbnail

SkyShowtime to the Netherlands in 2022: you need to know this

In 2022 komen er meerdere nieuwe streamingdiensten bij, waaronder SkyShowTime vol bekende series en films. Dit moet je weten over SkyShowtime in Nederland. Lees verder na de advertentie. SkyShowtime in Nederland In de Verenigde staten zijn de afgelopen jaar verschillende nieuwe streamingdiensten gelanceerd die we in Nederland nog niet hebben. Daartussen zitten Paramount Plus en…
Read More
Comment on China mobile social app users’ purchase behavior overview 2017 by Comment on China mobile social app users’ purchase behavior overview 2017 by Comment on China mobile social app users’ purchase behavior overview 2017 by Comment on China m thumbnail

Comment on China mobile social app users’ purchase behavior overview 2017 by Comment on China mobile social app users’ purchase behavior overview 2017 by Comment on China mobile social app users’ purchase behavior overview 2017 by Comment on China m

55% of China social app users reported having bought or paid for goods or services on a social app, and of those who have made purchases, more than half were between 50 and 250 yuan, with more than 90% below 1000 yuan according to iResearch. Most consumers have accepted social app advertising as a valid
Read More
This bird is like a GPS for honey thumbnail

This bird is like a GPS for honey

Show me the honey — The honeyguide recognizes calls made by different human groups. Elizabeth Rayne - Dec 29, 2023 6:00 pm UTC Enlarge / A greater honeyguide With all the technological advances humans have made, it may seem like we’ve lost touch with nature—but not all of us have. People in some parts of
Read More
Google Got Donald Glover to Hype its AI Video Generation Tool thumbnail

Google Got Donald Glover to Hype its AI Video Generation Tool

Google unveiled its new and updated suite of image, video and music AI generation tools early this morning during its Google I/O 2024 event. VideoFX is the new addition to its generative media toolkit, joining ImageFX and MusicFX and to hawk its new product, Google got none other than actor Donald Glover, aka Childish Gambino
Read More
Index Of News