Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


[AMD vuln] New AMD Side Channel Attacks Discovered, Impacts Zen Architecture
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

[AMD vuln] New AMD Side Channel Attacks Discovered, Impacts Zen Architecture

HostSlickHostSlick Member, Patron Provider
edited March 2020 in General

Seeing all the Intel Vuln Topics, they (Graz University) also now found a Vuln for AMD processors which also affects Ryzen and Epyc aswell.

https://www.tomshardware.com/uk/news/new-amd-side-channel-attacks-discovered-impacts-zen-architecture

We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+ Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last level-cache evictions."

Thanked by 2default mrTom

Comments

Sign In or Register to comment.