Questions tagged [intel]
For security questions specifically related to Intel processors or other Intel hardware.
35
questions
0
votes
1
answer
1k
views
Which Intel CPUs do not have Management Engine (ME) [duplicate]
The Intel Management Engine (ME) is a security risk which I would prefer not to take. I do not trust it, it seems to be a backdoor, and there are reported vulnerabilities on it.
I do not trust the ...
0
votes
0
answers
693
views
Intel CET more secure than AMD Shadow Stack?
I'm trying to decide between AMD or Intel for a new build. I was reading about protection from ROP-attacks and it seems like Intel and AMD are handling this in different ways.
AMD Zen 3 and later ...
2
votes
1
answer
579
views
What is the difference between Soft mode and HAP mode for disabling Intel ME?
Today is finally arrived the Dasharo Firmware with the option to disable the Intel ME from bios.
My question is: Which method is better? Soft or HAP? I actually choose soft, and seems no problem given....
0
votes
2
answers
206
views
How do you detect attacks on Intel ME firmware and the AMD equivalent?
Since there are quite a few exploits of Intel ME firmware in the CPU (same applies to AMD), I would like to know what SIEM solutions are there for detecting these kinds of attacks.
To be more exact, I ...
6
votes
2
answers
5k
views
What is the function of Intel's Total Memory Encryption (TME)?
https://edc.intel.com/content/www/us/en/design/ipla/software-development-platforms/client/platforms/alder-lake-desktop/12th-generation-intel-core-processors-datasheet-volume-1-of-2/002/intel-multi-key-...
1
vote
1
answer
1k
views
What is the latest version of ThinkPad laptops that doesn't have Intel Management Engine or similar remote controller built-in?
I work in cybersecurity and would like to find an older laptop that doesn't have the Intel Management Engine built-in, while still able to run a Debian OS well.
I have an IBM ThinkPad t42 with 42T0273 ...
0
votes
0
answers
252
views
Feasibility of CPU Backdoors
Recently I was thinking of the feasibility of hardware backdoors in the CPU introduced by manufacturers at the behest of three letter agencies. I can think of two potential backdoors that seem ...
0
votes
1
answer
390
views
Intel Ethernet Driver Advanced Settings for Security/Privacy
There are some settings found on Device Manager > Ethernet Driver > Advanced Tab.
Are there suggestions for any of these settings? or any suggestion to improve ethernet driver security?
Adaptive ...
6
votes
1
answer
865
views
INTEL-SA-00086 extracting the secret key used to encrypt Intel CPU code: is the digital signature bypassed?
In a recent attack to INTEL-SA-00086, the researchers are able to extract the secret key that encrypts updates to various Intel CPUs.
In the arstechnica blog it is mentioned as
The key may also allow ...
4
votes
0
answers
490
views
FLUSH + RELOAD Proof of Concept - Why do we need to flush more than needed?
Problem
I am putting together a proof of concept for the FLUSH + RELOAD attack. The method is outlined in great detail in this paper. The general idea is simple - cached addresses can be accessed with ...
1
vote
0
answers
433
views
Is it possible to debunk Intel Management Engine conspiracy theories using a data usage monitor device?
If there would be any backdoor in recent Intel CPU's, then it should send and receive data secretly.
Isn't it possible to easily debunk this conspiracy theory by implementing a third physical device ...
1
vote
0
answers
355
views
How can access to Intel ME / AMT be disabled with firewall? [duplicate]
Short of flashing BIOS, there seems to be no way to disable the Intel ME.
So, is there a reliable way to block access to Intel ME, such using HW firewall (Firewall in front of the machine, not ...
4
votes
1
answer
5k
views
Sacrificing 30% of my CPU performance (by disabling Hyper-Threading) to fully mitigate CPU vulnerabilities, necessary?
I used the spectre-meltdown-checker, version 0.42, without any option resulting in all-green results. But, in a help page, I found the --paranoid switch, which resulted in about a half of later CVEs ...
12
votes
3
answers
4k
views
Ring -3 exploits and existence of other rings
Concept of Rings
Rings were introduced in the forerunner of UNIX, Multics, and had 8 rings for reading, writing, executing and calling (I don't quite understand why it needed 8 rings to do this, if ...
0
votes
1
answer
262
views
A new exploit in town: SWAPGS. How and why did it happen?
Apparently, there's a new speculative execution exploit in town on Intel CPUs: SWAPGS. It takes research on Meltdown and Spectre to the next level and targets the root of the CPU.
This is not the ...