Feeds

MS to intro hardware-linked security for AMD64, Itanium, future CPUs

NX technology becomes the standard from XP SP2

  • alert
  • submit to reddit

High performance access to file storage

Microsoft is to introduce hardware-linked security technology with Windows XP Service Pack 2, and beyond that will make "additions to Windows" supporting the technology, execution protection (NX). The feature is already supported by shipping AMD K8 and Intel Itanium processor families, and according to Microsoft: "It is expected that future 32 and 64-bit processors will provide execution protection.

"Microsoft is preparing for and encouraging this trend by supporting execution protection in its Windows operating systems." So is it DRM?

Not exactly, not yet, but it's another example of the closer linking of hardware and software that will result in the processors with NGSCB built-in that Bill Gates promised at the recent Professional Developers Conference, and a reread of his keynote after hearing about NX does tend to suggest that Bill might not see any clearly defined line between the two, and between hardware security and hardware ID. And linkage is helpful from the point of view of selling DRM to users; clearly, you can't pitch hardware protection that screws up your ability to listen to music as you wish as an unalloyed benefit for the general public, but you can sell them it on the basis it stops Bad Things coming at them from The Net.

Microsoft can also use compliance with this and future hardware features as the 'entry ticket' for hardware manufacturers wanting Windows development relationships and support. One might speculate that Windows XP support for AMD64 might not be entirely unconnected with NX support. As Microsoft says: "The 32-bit version of Windows currently leverages the NX processor feature, as defined by the AMD64 Architecture Programmer's Manual." So actually, it's not being introduced to the mass market with SP2 - it's here already for AMD64 platforms.

NX "uses the CPU itself to enforce the separation of application code and data, preventing an application or Windows component from executing program code that an attacking worm or virus inserted into a portion of memory marked for data only." Which is quite cute really, when you consider that one of the fundamental security problems of Windows is its failures in separating application code from data. Fix Windows? Go back to basics and write a proper operating system? Nope, we have a better idea... Whatever, although there may be applications for NX support in non-Windows operating systems, it doesn't immediately look like a 'must have' for, say, Linux in the same way that it does for Windows.

Does it have direct DRM implications? None that are obvious to us at first reading, but it clearly does have potential to help Microsoft leverage DRM into the CPU. It certainly does have a 'breakware' component, as Microsoft tells us:

"Some application behaviors are expected to be incompatible with execution protection. For example, applications that perform dynamic code generation (such as Just-In-Time code generation) that do not explicitly mark generated code with execute permission may have compatibility issues with execution protection. Note that managed code applications and components built on the Microsoft .NET Framework's common language runtime (CLR) will continue to work—the CLR is compatible with execution protection in SP2.

"Application and driver developers should be aware of execution protection and the requirements of software running on a supporting platform. Applications that perform just-in-time (JIT) code generation or execute memory from the default process stack or heap should pay careful attention to execution protection requirements. The .NET Framework, for example, works with the NX bit set."

So some applications will be broken by SP2, although this will obviously only happen on systems that already ship with NX in the CPU. In the longer (presumably not hugely longer) term all volume CPUs will have it, and it will clearly encourage developers to go down Microsoft's preferred development route (i.e., the one that leads to Longhorn) as quickly as possible. This, says Microsoft, is "promoting general good coding practices."

Bear in mind that Microsoft wants and intends to make a big noise about the steps it's taking to make Windows secure, and that it's therefore going to want to package, present and market this and other security features. Meanwhile, the chip companies and the PC companies desperately (even more so than usual) want to figure out ways to get people to buy even more new computers. An SP2-based refresh with added hardware worm protection and just a soupcon of ID/DRM for fall 2004 does look awfully compelling to us. Athens provides one possible base for packaging this, and with Tablet and MPC starting to look tired by then, even without the 'sell security' imperative Microsoft surely needs to think up a couple more compelling packages. Will the chip companies switch from running and hiding whenever anybody mentions hardware protection to actively marketing it? It could happen, it really could... ®

Related stories:
Longhorn as the next Microsoft desktop domination play
Microsoft security paper

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.