Check out our Monthly Survey Page to see what our users are running.

Say hello to PLATYPUS, the latest CPU security problem

By - | Views: 17,031

This kind of PLATYPUS is not a sweet and unusual mammal, this is a security problem recently announced that affects Intel across server, desktop and laptop CPUs. Along with a long list of other Intel issues that went public today (there's like 40 of them…), PLATYPUS is one that's gaining some attention and came with its own fancy website.

PLATYPUS (Power Leakage Attacks: Targeting Your Protected User Secrets) is a way to exploit the unprivileged access to the Intel RAPL (Running Average Power Limit) interface exposing the processor's power consumption to infer data and extract cryptographic keys. Physical access is not required the researchers say, so it's quite a concerning one.

You can check out these two videos they released to explain it a little:

YouTube Thumbnail
YouTube videos require cookies, you must accept their cookies to view. View cookie preferences.
Accept Cookies & Show   Direct Link
YouTube Thumbnail
YouTube videos require cookies, you must accept their cookies to view. View cookie preferences.
Accept Cookies & Show   Direct Link

Here's some more information from the website setup for PLATYPUS:

With classical power side-channel attacks, an attacker typically has physical access to a victim device. Using an oscilloscope, the attacker monitors the energy consumption of the device. With interfaces like Intel RAPL, physical access is not required anymore as the measurements can be accessed directly from software. Previous work already showed limited information leakage caused by the Intel RAPL interface. Mantel et al. showed that it is possible to distinguish if different cryptographic keys have been processed by the CPU. Paiva et al. established a covert channel by modulating the energy consumption of the DRAM.

Our research shows that the Intel RAPL interface can be exploited in way more threatening scenarios. We show that in addition to distinguishing different keys, it is possible to reconstruct entire cryptographic keys. We demonstrate this by recovering AES keys from the side-channel resilient AES-NI implementation, as well as RSA keys from an Intel SGX enclave. In addition, we distinguish different Hamming weights of operands or memory loads, threatening constant-time implementations of cryptographic algorithms. To mitigate PLATYPUS, the unprivileged access to the energy consumption has been revoked with an update to the operating system. With Intel SGX, however, a compromised operating system is within the threat model, rendering this mitigation insufficient. Therefore, Intel released microcode updates that change the way the energy consumption is reported if Intel SGX is enabled on the system. Instead of actual energy measurements, it falls back to a model-based approach, such that same instructions with different data or operands can not be distinguished.

Who is behind PLATYPUS? Various developers at Graz University of Technology, CISPA Helmholtz Center for Information Security and the University of Birmingham including: Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella and Daniel Gruss.

Are you directly affected? Well it goes all the way back to Sandy Bridge (2011), so have a look at the list of what's affected which can be found here. Intel released microcode updates to affected processors and for Linux there's been security updates to help with it. As always, ensure you're up to date everywhere possible.

The research does mention that other vendors are affected too like AMD from the Zen architecture onwards, but it appears limited to AMD Rome CPUs. ARM and NVIDIA too are possible as they all have these features available but the main testing has been done against Intel for now.

You can read more about PLATYPUS here. See the full Intel Security page for the rest of them.

Article taken from GamingOnLinux.com.
24 Likes, Who?
We do often include affiliate links to earn us some pennies. We are currently affiliated with GOG, Humble Store and Paradox Interactive. See more here.
About the author -
author picture
I am the owner of GamingOnLinux. After discovering Linux back in the days of Mandrake in 2003, I constantly came back to check on the progress of Linux until Ubuntu appeared on the scene and it helped me to really love it. You can reach me easily by emailing GamingOnLinux directly.
See more from me
24 comments
Page: 1/3»
  Go to:

dpanter 10 Nov
link
whizse 10 Nov
  • Supporter
Hell. Handbasket.
setzer22 10 Nov
Perry the Platypus, you did it again!
RTheren 10 Nov
Quoting: setzer22Perry the Platypus, you did it again!

Where is Dr. Doofenschmitz when you need him?
x_wing 10 Nov
So, now even applications that wants to simply display power consumption will require some kind of privilege and the application by itself will have to be strengthened in order to avoid any possible backdoor. A big F...
Dedale 10 Nov
Platypi are a myth, they have not be created yet.

link
Quoting: DedalePlatypi are a myth, they have not be created yet.

link
Turns out they're also bioluminescent.
Or, um, will be when they're created. Maybe the glow-in-the-dark thing is a byproduct of that production method.


Last edited by Purple Library Guy on 10 November 2020 at 9:55 pm UTC
WorMzy 10 Nov
Hello, Platypus!

Incidentally, the platypus was created by a number of woefully-overconfident wizards trying to teach the creator of the last continent how to paint.

Edit: Shit, sorry, keep forgetting this is roundworld. Don't mind me. Go about your business.


Last edited by WorMzy on 10 November 2020 at 10:11 pm UTC
Dedale 10 Nov
Quoting: Purple Library GuyTurns out they're also bioluminescent.
Or, um, will be when they're created. Maybe the glow-in-the-dark thing is a byproduct of that production method.

I did not know that ! Thanks !

My apologies for drifting so much off-topic.
Ehvis 10 Nov
View PC info
  • Supporter Plus
It really reads like another one of those theoretical attacks that can be nicely demonstrated under controlled conditions, but have zero chance of succeeding in real world situations. Consider me not worried in the slightest.
While you're here, please consider supporting GamingOnLinux on:

Patreon, Liberapay or PayPal Donation.

We have no adverts, no paywalls, no timed exclusive articles. Just good, fresh content. Without your continued support, we simply could not continue!

You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Login / Register

Or login with...
Sign in with Steam Sign in with Twitter Sign in with Google
Social logins require cookies to stay logged in.

Livestreams & Videos
Community Livestreams
Latest Forum Posts