No announcement yet.

Hertzbleed Disclosed As New Family Of Side-Channel Attacks Affecting Intel + AMD

  • Filter
  • Time
  • Show
Clear All
new posts

  • #21
    Originally posted by binarybanana View Post

    If your CPU is actually locked to full boost frequency then you aren't affected if I understand right. If it scales up dynamically dependent on load (even if it can boost forever), then you're affected. But this seems even more far fetched than all the the previous vulns so I'd expect impact to be limited. So much so that Intel won't even release a "fix".
    I don't think it will be affected by boost either unless constrained by a power limit or thermal envelope. Boosting based on just running CPU bound code for full timeslots. It isn't effected by what instructions are used. To be able to measure the minute differences in power consumption based on variables, you need to be scaling based on power consumption.


    • #22
      Originally posted by Termy View Post
      This should mainly affect servers with VMs again, right?
      any other software/user on your system can utilize exploits like this, a full VM is not required but of course they will be far more susceptible to this since they be default are other users running software on your system.


      • #23
        I have serious doubts as to the actual practical exploitability of this. Also, on VMs this should be less of an issue, not more, as is being suggested above me? On VMs there is less correlation between power usages and the happenings inside the specific VM, since whatever is hosting the VM is presumably doing lots of other things too.


        • #24
          Originally posted by mlau View Post
          I can certainly see a patient attacker using this to exfiltrate seldom-changed keys.
          The thing is, there are a LOT of "seldom-changed keys" out there. The monthly/etc password changes that clueless IT depts insist on are actually security theater that does more harm than good, and NIST has advocated against them strongly for a very long time now.

          Similarly, while most encryption methods will let you rewrap a key with a new passphrase, the key itself remains constant, for obvious reasons.

          Luckily, this does seem very much like a purely-academic "threat" right now, and unlikely to be advanceable into something practical, but we'll have to see how things go.