Industry Responds to Unprecedented CPU Security Vulnerability
Unique collaboration between chip makers and software firms may be a sign of things to come for a tech landscape facing a barrage of security threats.
Early leaks on the so-called security bug focused on Intel, but it’s now clear that the security vulnerabilities announced Wednesday have a much broader impact on many contemporary, high-performance processors and, not just Intel.
There are actually three different side-channel attacks that security researchers at Google Project Zero and other firms have identified. These attacks use a combination of knowledge of the internal operation of modern CPU and some level of brute force testing.
It’s important to note that, to date, these vulnerabilities have not been seen exploited in the wild. But with this disclosure, attacks can be crafted by knowledgeable hackers — which is why there has been a race to patch these vulnerabilities throughout the software ecosystem.
Part of the team that was needed to fix the vulnerabilities were CPU designers AMD, ARM and Intel. Key system software vendors included Apple, Citrix, Linux, Microsoft and VMWare.
To read the full article, click here
Related Semiconductor IP
- RVA23, Multi-cluster, Hypervisor and Android
- 64 bit RISC-V Multicore Processor with 2048-bit VLEN and AMM
- NPU IP Core for Mobile
- RISC-V AI Acceleration Platform - Scalable, standards-aligned soft chiplet IP
- H.264 Decoder
Related Blogs
- Upcoming IoT Security Legislation: Vulnerability Disclosure - Part 2
- ARM's new brain
- IP-SoC 2011 Trip Report: IP again, new ASSP model, security, cache coherence and more
- The Middle is A Bad Place to Be if You're a CPU Board
Latest Blogs
- How fast a GPU do you need for your user interface?
- PCIe 6.x and 112 Gbps Ethernet: Synopsys and TeraSignal Achieve Optical Interconnect Breakthroughs
- Powering the Future of RF: Falcomm and GlobalFoundries at IMS 2025
- The Coming NPU Population Collapse
- Driving the Future of High-Speed Computing with PCIe 7.0 Innovation