It's the easiest way to fix these flaws: have a fundamentally separate SoC with a small attack surface in a purely management role, which is responsible for confirming main CPU's behavior is in line with expectations. Like ME, but external and auditable.
-
-
Replying to @hedgeberg @JaceCear
How would this work? If it has to monitor everything the main CPU does, it has to be as powerful as the main CPU. If it doesn't, then you could make the main CPU do evil things that it wouldn't catch.
2 replies 0 retweets 4 likes -
It wouldn’t be to different from monitoring software currently used. The goal is detection of malicious activity, so if you can do classification and identification fast enough you don’t need to replicate the CPU.
2 replies 0 retweets 0 likes -
I mean, we all know antivirus doesn't work. Reactive technologies are great and all, but how would you fundamentally distinguish malicious behavior from normal operation besides known signatures?
2 replies 0 retweets 1 like -
I am similarly lost as to the how, but I’m given the impression that it is already employed in some high security environments. I was once told in avionics systems the working assumption is an attacker is already inside, and may have rooted one of the computers onboard.
1 reply 0 retweets 0 likes -
Replying to @siriusfox @marcan42 and
The implication being multiple systems would filter each other’s data, identify strange behavior, and restart each other as required. I don’t think it’s easy or efficient, but like most attacks we gauge risk and acessabulity to the surface when we craft countermeasures.
1 reply 0 retweets 0 likes -
I think you're mixing together redundant voting systems and security. Having things like 3 identical systems doing the same thing and cross checking each other is common in avionics, but that's for reliability. If you're an attacker you just compromise all 3 at once.
2 replies 0 retweets 0 likes -
The context as it presented to me at the time was that the systems were not redundant, they just didn’t trust the other computing subsystems sitting on a common platform. I don’t know the how unfortunately.
1 reply 0 retweets 0 likes -
That's just general security hygiene then, no? You want to prevent lateral movement, so you don't trust any external system to give you valid data.
1 reply 0 retweets 0 likes -
Yea. What surprised me at the time was the systems don’t have any external network. It felt like buying a handful of new computers, installing your software, and then assuming you were still bugged without routine external exposure.
1 reply 0 retweets 0 likes
Tell that to the Iranian centrifuges. There's always some idiot around to screw things up with a flash drive. Somehow. Airgaps are great until a human completely destroys them.
-
-
Of course. It makes sense that in a high value target those assumptions fall apart, but it was personally disorienting from a consumer perspective.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.