Intel denies new SpecterRSB attacks bypass current protections
Researchers at the University of California have presented new Spectre-like attacks called SpectreRSB. Existing countermeasures would not stop them. Intel contradicts that and says that no new measures are needed.
In their recent paper, the four authors write, “None of the known countermeasures such as Retpoline and Intel microcode are able to stop all SpectreRSB attacks.” The naming of the attacks means that they are Spectre-like techniques, with which it is possible to read sensitive information. Instead of targeting the branch predictor of CPUs, the variants discovered by the researchers target the so-called return stack buffer, or rsb, which, according to the authors, predicts return addresses. The researchers present six different variants of SpectreRSB.
Paper overview of attack variants and countermeasures
In a response to The Register, Intel says it believes that “SpectreRSB is related to branch target injection” and that it expects that existing measures will also work against the new variants. Intel is referring to the second variant of the Specter attack, which was publicized at the beginning of this year. Intel says it has already published guidelines for developers in a white paper. The researchers tested their attacks on Intel processors of the Skylake and Haswell generations and attacked SGX enclaves. While they only tested Intel systems, they also shared their findings with ARM and AMD, as they also allegedly use return stack buffers.
The researchers’ findings come on top of previous discoveries of Spectre-like attacks, the numbers of which continue to rise steadily. Tweaker Squee recently mapped out all the different variants, which are also listed below in a table.
Specter variant 1 | Bounds check bypass, CVE-2017-5753 |
Specter variant 1.1 | Bounds check bypass on stores, CVE-2018-3693 |
Specter variant 1.2 | Read only store |
Specter variant 2 | Branch target injection, CVE-2017-5715 |
Meltdown (variant 3) | Rogue data cache load, CVE-2017-5754 |
Specter variant 3a | Rogue system registry read, CVE-2018-3640 |
Specter variant 4 | Speculative store bypass, CVE-2018-3639 |
Lazy FP restore | CVE-2018-3665 |
SpectreRSB | – |