[AMD vuln] New AMD Side Channel Attacks Discovered, Impacts Zen Architecture
Seeing all the Intel Vuln Topics, they (Graz University) also now found a Vuln for AMD processors which also affects Ryzen and Epyc aswell.
We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+ Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last level-cache evictions."