google-ads

Tech Updates

New CET Technology added in Intel CPU's to Protect From Malware Attack.

https://www.intel.in/content/www/in/en/homepage.html
New CET Technology added in Intel CPU's to Protect From Malware Attack.

New CET Technology added in Intel CPU's to Protect From Malware Attack.

A Big giant company Intel features deals with 'control flow' in which tasks are executed in the CPU, it is used to prevent malware modifying the control flow of other apps.

Intel has been working on CET, Which stands for Control-flow Enforcement Technology, since 2016 when when it was first published the first version of the CET Specification. As Its name Suggest CET deals with control flow a technical term used to describe in order in which operation are executed inside the CPU.

https://www.intel.in/content/www/in/en/homepage.html

The Malware runs on device can use later in other apps to hijack their control flow and insert its malicious code to run in the context of another app. On Intel's future Tiger lake mobile CPU's CET will protect the control flow via two new security new mechanism namely shadow stack and indirect branch tracking. This new security feature also offers software developers two key capabilities to help defend against control flow hijacking malware : Indirect Branch Tracking (IBT) and Shadow Stack (SS).

As an new feature in Windows 10, Microsoft has worked with Intel to offer hardware-enforced stack protection built into windows 10 to enforce code integrity as well as terminate any malicious code. Intel Points to TrendMicro's Zero Day Vulnerability report indicate that 63.2% of the 1,097 Vulnerabilities from 2019 to today were memory safety related. 

Mainly These type of Malware basically target Operating System, Browser, readers and many other application. It takes deep hardware integration at the foundation to deliver effective security features with minimal performance impact, Intel Said.


No comments