• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Friday, October 31, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

PLATYPUS: New vulnerabilities discovered in Intel processors

Bioengineer by Bioengineer
November 11, 2020
in Science News
Reading Time: 3 mins read
0
IMAGE
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

IMAGE

Credit: © 2018 Lunghammer – TU Graz

Power side-channel attacks are attacks that exploit fluctuations in power consumption to extract sensitive data such as cryptographic keys. Because power measurements with a malware were previously too inaccurate, such attacks required physical access to the target device and special measurement tools such as an oscilloscope.

Researchers at the Institute of Applied Information Processing and Communications at Graz University of Technology have been working intensively with power-based side channels for almost 20 years. In 2017, they began investigating software-based power attacks. Together with colleagues from the University of Birmingham and the Helmholtz Center for Information Security (CISPA), they have succeeded in taking the final step. At https://platypusattack.com they present PLATYPUS, a method that allows power side-channel attacks even without physical access. Affected devices include desktop PCs, laptops and cloud computing servers from Intel and AMD.

RAPL interface and SGX enclaves as key

The researchers used two key approaches. In the first, they used the RAPL interface (Running Average Power Limit), which is built into Intel and AMD CPUs. This interface monitors the energy consumption in the devices and ensures that they don’t overheat or consume too much power. RAPL has been configured so that power consumption can be logged even without administrative rights. This means that the measured values can be read out without any authorizations.

In the second approach, the group misuses Intel’s security function Software Guard Extensions (SGX). This functionality moves data and critical programs to an isolated environment (called an enclave) where they are secure – even if the normal operating system is already compromised by malware.
Combination leads to (un)desired result

The researchers combined these two techniques in their methods of attack. Using a compromised operating system targeting Intel SGX, they made the processor execute certain instructions tens of thousands of times within an SGX enclave. The power consumption of each of these commands was measured via the RAPL interface. The fluctuations in the measured values finally allow to reconstruct data and cryptographic keys.

In further scenarios, the researchers also show that even attackers without administrative rights can attack the operating system and steal secret data from it.

New security updates resolve the threat

The TU Graz computer scientists Moritz Lipp, Andreas Kogler, Catherine Easdon, Claudio Canella and Daniel Gruss together with their ex-colleague Michael Schwarz (researching at CISPA in Saarbrücken since summer 2020) and with David Oswald from the University of Birmingham informed Intel and AMD about their discoveries in November 2019. The companies have now developed solutions that users should definitely adopt. A security update allows access to the RAPL measurement functions only with administrator rights. And further updates for the affected processors themselves ensure that the power consumption is returned in such a way that the subtle differences in the power consumption of programs are no longer visible.

This research is anchored in the Field of Expertise “Information, Communication & Computing”, one of the five research foci of Graz University of Technology.

###

Media Contact
Moritz Lipp
[email protected]

Original Source

https://www.tugraz.at/en/tu-graz/services/news-stories/media-service/singleview/article/platypus-neue-schwachstellen-in-intel-prozessoren-entdeckt0/

Tags: Computer ScienceHardwareSoftware EngineeringSystem Security/HackersTechnology/Engineering/Computer Science
Share12Tweet8Share2ShareShareShare2

Related Posts

Breakthrough: First Transplant of Porcine Kidneys Modified with Human Renal Organoids in Pigs

October 31, 2025
Engineering the Midnolin-Proteasome Pathway for Precision Targeted Protein Degradation

Engineering the Midnolin-Proteasome Pathway for Precision Targeted Protein Degradation

October 31, 2025

Ibrutinib-Induced Redox Imbalance Triggers Ferroptosis in DLBCL

October 31, 2025

Molecular-Level Breakthrough in Electrochromism Unveiled

October 31, 2025
Please login to join discussion

POPULAR NEWS

  • Sperm MicroRNAs: Crucial Mediators of Paternal Exercise Capacity Transmission

    1293 shares
    Share 516 Tweet 323
  • Stinkbug Leg Organ Hosts Symbiotic Fungi That Protect Eggs from Parasitic Wasps

    312 shares
    Share 125 Tweet 78
  • ESMO 2025: mRNA COVID Vaccines Enhance Efficacy of Cancer Immunotherapy

    202 shares
    Share 81 Tweet 51
  • New Study Suggests ALS and MS May Stem from Common Environmental Factor

    136 shares
    Share 54 Tweet 34

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Breakthrough: First Transplant of Porcine Kidneys Modified with Human Renal Organoids in Pigs

Engineering the Midnolin-Proteasome Pathway for Precision Targeted Protein Degradation

Ibrutinib-Induced Redox Imbalance Triggers Ferroptosis in DLBCL

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 67 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.