Skip to main content

New ‘Prime’ Meltdown, Spectre exploits outlined by Nvidia, Princeton University

Just one month after researchers exposed methods to extract sensitive data from a device’s memory through all modern processors, another research paper arrives to illustrate how the processor design flaw can be used in other attacks. The paper, dubbing the new exploits MeltdownPrime and SpectrePrime, derives from three researchers who work at at Princeton University and graphics chip manufacturer Nvidia. 

As reported last month, all processors dating back to at least 2011 have a flaw in the way they’re designed. Part of a processor’s speed comes from its ability to predict where the current list of instructions will go — they have “branch prediction units” that take an educated guess about what command will come next. To make these predictions, processors toss data back and forth from two memory sets: local on-chip memory called cache for fast access, and the PC’s system memory. This data isn’t secured, and that’s where the original Meltdown and Spectre attacks come in. 

The Meltdown approach applies to Intel and Apple processors. A hacker can create a malicious program to access that raw information, which could include usernames, passwords, credit card numbers, and so on. It taps into the privileged information typically only accessible by the root of an operating system, otherwise known as the kernel. 

Get your weekly teardown of the tech behind PC gaming
Check your inbox!

Meanwhile, Spectre applies to Intel, AMD, and all mobile chips based on ARM’s processor design, including Apple. Here hackers can create a program to trick the processor into executing instructions not built into legitimate programs and apps installed on the PC. In other words, your favorite apps and programs could be tricked into coughing up your sensitive data. 

Both methods are merely proof-of-concepts reported by Google Project Zero, and researchers from Cerberus Technology and various universities. Both are called side-channel attacks as they don’t target specific software, such as Adobe Flash. 

The new MeltdownPrime and SpectrePrime exploits rely on an attack called Prime+Probe that takes advantage of processor “cache invalidations,” which is a method of replacing or removing entries in the CPU’s cache. Whereas Meltdown and Spectre simply “pollute” this cache during the CPU’s path prediction (aka speculative execution), the new exploits take a different approach. 

“MeltdownPrime and SpectrePrime are caused by write requests being sent out speculatively in a system that uses an invalidation-based coherence protocol,” the paper states. A coherence protocol means that the PC is keeping all data stored in cache and memory consistent. But that protocol may “invalidate cache lines in sharer cores as a result of a speculative write access request even if the operation is eventually squashed.” 

The researchers validated their findings using a MacBook packing an Intel Core i7 processor, and MacOS Sierra v10.12.6. They ran the exploit 100 times on the machine, with a 99.95-percent success rate for SpectrePrime versus the 97.9-percent rate seen with the vanilla Spectre exploit. 

“We believe that any software techniques that mitigate Meltdown and Spectre will also be sufficient to mitigate MeltdownPrime and SpectrePrime. On the other hand, we believe that microarchitectural mitigation of our Prime variants will require new considerations,” the paper states. 

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
What is Microsoft 365? Here’s the cloud software suite, explained
Microsoft Office free apps.

Microsoft 365 is the brand’s suite of cloud-based productivity apps that can be used for word processing, group collaboration, data analysis, presentation development, storage, and email. Many may be familiar with Microsoft Teams, Word, Excel, PowerPoint, Outlook, and OneDrive as separate applications at one point; however, many high-performance users may utilize more than one of these programs for work, hobbies, or their everyday lives.

This could serve as a reason to consider Microsoft 365, to get more comprehensive access to the brand’s app library. Here is a look at what you need to know about the Microsoft 365 productivity suite.
Microsoft 365 paid subscriptions 

Read more
France’s cyber unit preps for potential cyberattacks targeting Paris Olympics
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Organizers at the Paris Olympics are expecting a wave of cyberattacks to target the Games when the sporting extravaganza kicks off in earnest this weekend.

Researchers have noted that some attacks have already started, with Russia-affiliated hackers suspected to be behind the nefarious efforts, Bloomberg reported on Thursday.

Read more
Gamers are flocking to return Intel CPUs — and some are permanently damaged
A hand holds the Intel Core i9-12900KS.

Intel's troubles with instability on 13th-gen and 14th-gen CPUs continues to escalate, and a new report suggests that gamers are returning these CPUs at a much higher rate than retailers expect. An anonymous European retailer says they've seen four times as many returns for 13th-gen and 14th-gen CPUs compared to 12th-gen, according to a report from French outlet Les Numeriques.

Returns have only ramped up recently, however. The retailer says that in the six months following the release of all three generations, the return rates are nearly identical. Looking at the rate now, however, 13th-gen CPUs are being returned four times as often as 12th-gen, while 14th-gen CPUs are being return three times as much. Given what we've learned about Intel's instability issue, this suggests that the processors do, indeed, degrade over time.

Read more