Home SECURITY Intel Announces New Malware Threat Security Feature for Tiger Lake Processor

Intel Announces New Malware Threat Security Feature for Tiger Lake Processor

0
Intel Announces New Malware Threat Security Feature for Tiger Lake Processor

Intel Announces New Malware Threat Security Feature for Tiger Lake Processor

Intel announced in a press release a new security technology that matches the upcoming Tiger Lake processors. This is Intel® Control-Flow Enforcement Technology (Intel CET), which provides CPU-level security to help protect against common forms of malware attacks that are difficult to solve only via software. The company recently announced its Lakefield processors and donated $ 1 million to the fight against racism.

In the announcement, signed by Tom Garrison, vice president of Client Computing Group and general director for Intel’s Security Strategies and Initiatives (SSI), the executive points out that the product is the result of the company’s commitment to maintaining security first, delivering advances that help protect the company’s technology against cyber attacks, which are constantly evolving.

Garrison also says that it all starts with the development and deployment of security features in Intel products and continues with our efforts with the industry to advance security innovation. Intel CET technology is intended to protect users against the misuse of legitimate code through flow control hijacking attacks.

For this, it has two main resources that will be offered to software developers to defend against control-flow hijacking malware: indirect branch tracking and shadow stack. The first provides indirect protection from branches in the JOP / COP type oriented programming attack methods, while the second provides return address protection to help defend against return-oriented programming (ROP) attack methods.

Intel Announces New Malware Threat Security Feature for Tiger Lake Processor
Intel Announces New Malware Threat Security Feature for Tiger Lake Processor

About 63.2% of the 1097 vulnerabilities disclosed by the Zero Day Initiative (ZDI) from 2019 to date were related to memory security, and malware typically affects operating systems, browsers, readers and other applications. Intel points out that scaling operating systems and adopting applications to truly solve this problem requires collaboration between all players in the industry.

The Intel CET specifications were published in 2016, and the company works alongside Microsoft to get Windows 10 and developer tools ready to receive applications and get even better protection against flow control hijacking threats. The company sees the Intel CET feature as a milestone in the industry for being embedded in microarchitecture and available in a number of products with this type of core.

👇 More in NUpgrade