Announcement
Collapse
No announcement yet.
Hertzbleed Disclosed As New Family Of Side-Channel Attacks Affecting Intel + AMD
Collapse
X
-
My understanding is openssl and libressl use methods to prevent these kind of attacks. Are these findings finding that they need rethought, hardened further or is do other implementations need hardened?
-
Originally posted by mlau View PostI read a bit of the PoC code:
- it works apparently best when the crypto stuff to be sniffed is the only running task. Windows users should be immune by virtue of the OS being a resource hog
- It needs root otherwise it can't read the RAPL (energy monitor) registers.
- It's not fast.
I can certainly see a patient attacker using this to exfiltrate seldom-changed keys.
you can measure the timing differences during several rounds between client and server. crypto is slow so a 5% difference can be noticeable.
writing crypto code to always take the same amount of time is a big deal and this attack cracks that apart.
- Likes 4
Leave a comment:
-
This attack is very likely running repeated measurements and building statistical models from that. Or just unleashing machine learning on the data. Of course, the wall-clock time is absolutely meaningless with just one measurement. However, this attack relies on something more subtle: on *differences* between wall-clock times. Sounds even more noisy, but with enough measurements all the noise either coalesces into biases or averages itself out. Modern processors are insanely fast and few users monitor their systems closely enough to notice a malicious attacker doing measurements. And this attack should actually work better if the attacker does *not* cause CPU utilization to peak at 100% for extended periods.
- Likes 4
Leave a comment:
-
WOOT even if you dont use turbos, you would have to deactivate every kind of power managment, and even then systems run on spread spectrum to be EMI certified.
So there is allways min. 1 mHz change, i doubt there is realy a way to exploit that thing, this is so highly unlikely, it´s like lightning strike, well some ppl get struck 7 times in the life tho, btw. how high is the chance that earth is hit by a meteor? 100% it happens all the time .Last edited by erniv2; 14 June 2022, 03:54 PM.
Leave a comment:
-
I read a bit of the PoC code:
- it works apparently best when the crypto stuff to be sniffed is the only running task. Windows users should be immune by virtue of the OS being a resource hog
- It needs root otherwise it can't read the RAPL (energy monitor) registers.
- It's not fast.
I can certainly see a patient attacker using this to exfiltrate seldom-changed keys.
- Likes 3
Leave a comment:
-
I guess that only affect laptops? My desktop has enough cooling to run boosted all the time on all cores
Leave a comment:
-
Guest repliedThe one time where tweaking my system for gaming actually improves security I usually disable any kind of frequency scaling and lock it to a multiplier, along with using performance governors/Ultimate Power Plan.
The problem seems to be with the CPU changing it's frequency with certain conditions, but it would sound like disabling scaling altogether would prevent that?
- Likes 3
Leave a comment:
-
If they are throwing that wall time issue in the summary, it should come with some context. What relies on that value being consistent? How is it even remotely possible for it to be consistent?
And if we narrow the scope to some scenario where you are only issuing single clock instructions on register operands - everything is there and is guaranteed to execute in a single clock, and you are guaranteed no cache misses, and you are guaranteed to not have the thread execution suspended by the os or by a hardware interrupt. Oh and ignore scheduling and out of order execution altogether...
Even in that super niche scenario, you could still count persistently via the actual clock cycles counter if you care about consistency that much. Then your count will be independent from the actual running clock speed.
Maybe someone can elaborate the actual reasons?
Leave a comment:
-
Originally posted by gururise View PostDamn, so encrypted communications and transactions are potentially compromised unless one disables turbo-boost?
- Likes 3
Leave a comment:
Leave a comment: