当前位置:网站首页>X86 CPU, critical! The latest vulnerability has caused heated discussion. Hackers can remotely steal keys. Intel "all processors" are affected
X86 CPU, critical! The latest vulnerability has caused heated discussion. Hackers can remotely steal keys. Intel "all processors" are affected
2022-06-25 03:41:00 【QbitAl】
Fish and sheep From the Aofei temple
qubits | official account QbitAI
x86 CPU, dangerous !
A new safety study shows that : In a country called Hertzbleed Under the attack mode of , Hackers can steal encryption keys directly from remote servers .
Whether it's Intel or AMD CPU, It's not immune .
The scope of influence is probably aunt sauce's .
Intel : All .

AMD:

The research came from research institutions such as the University of Texas at Austin and the University of Illinois at Urbana Champaign , Once the relevant papers were issued, they triggered a heated discussion .

What exactly happened , Let's study it carefully together .
in the light of DVFS The attack of
In cryptography , Power analysis It is a side channel attack method that has long existed .
for instance , By measuring the power consumed by the chip while processing data , Hackers can extract this encrypted data .
Fortunately, power analysis can not be realized remotely , The attack means are relatively limited .
But in Hertzbleed in , The researchers found that , Use dynamic voltage frequency scaling (DVFS), The power side channel attack can be transformed into a remote attack !
and DVFS, It is what major manufacturers are currently using to reduce CPU An important function of power consumption .
To be specific , The researchers found in the experiment , In some cases ,x86 The dynamic frequency scaling of the processor depends on the data being processed , Its particle size is milliseconds .
That is to say ,DVFS Caused by the CPU Frequency variation , It can be directly linked to the power consumption of data processing .
because CPU The difference in frequency can be converted into the difference in actual occurrence time , By monitoring the response time of the server , Attackers can observe this change remotely .

In the paper , The researchers are running SIKE( An encryption algorithm ) Tested on the server of Hertzbleed.
Results show , In an unoptimized attack version , They were in 36 Hours and 89 Within hours , Completely extracted Cloudflare Encryption library CIRCL And Microsoft PQCrypto-SIDH All keys in .
Intel &AMD: No patch
The researchers say , They are already in 2021 To Intel in the third quarter of 、Cloudflare And Microsoft disclosed the research . First quarter of this year , They also share AMD There was communication .
however , Intel and AMD There are no plans to patch this .
Intel senior director of secure communications and event response Jerry Bryant Think :
Although it is interesting from a research point of view , But we don't think this kind of attack is feasible outside the laboratory environment .
Intel rated the vulnerability as medium .

But Intel also mentioned in the announcement : Guidelines are being released to address this potential vulnerability .
While Microsoft and Cloudflare aspect , The encryption code base has been updated .
The researchers estimate that , These updates make CIRCL and PQCrypto-SIDH The cost of unpacking performance increases 5% and 11%.
They mentioned , Disable the frequency boost function , Intel's “Turbo Boost”、AMD Of “Turbo Core” etc. , Can ease Hertzbleed The problems brought about by , But this will have a bad impact on the system performance .
in addition , What's interesting is , The researchers revealed that , Intel did not issue a patch , But they were asked to postpone the release of the findings .
Reference link :
[1]https://www.hertzbleed.com/
[2]https://arstechnica.com/information-technology/2022/06/researchers-exploit-new-intel-and-amd-cpu-flaw-to-steal-encryption-keys/
— End —
Live registration | Arrayed optical waveguide :
Push AR The display technology of glasses going to the consumer market within three years
The development of metacosmic industry , Bringing together cutting-edge technologies , Build a new form of the next generation Internet . and AR equipment , Or will become the next generation of Internet “ Access level ” equipment .
Consumption level AR What is the core competitiveness of the equipment ?AR What is the technical principle of optical module ? How is its development ? Your first pair AR What will the device look like ?6 month 16 Japan , The live broadcast will be announced ~

Focus on me here , Remember to mark the star ~
边栏推荐
- 签到功能完成03《ivx低代码签到系统制作》
- What if Alipay is controlled by risk for 7 days? Payment solution
- Nacos practice record
- 在华泰证券上面开股票账户好不好,安不安全?
- Solution of separating matlab main window and editor window into two interfaces
- nacos实践记录
- When people look at the industrial Internet from the Internet like thinking and perspective, they have actually fallen into a dead end
- Expressing the transformation of two coordinate systems with vectors
- Eggservice builds the basic service of wechat official account
- There is the word "Internet" in the concept of industrial Internet, but it is an existence that is not related to the Internet
猜你喜欢
![[proteus simulation] Arduino uno+ nixie tube display 4X4 keyboard matrix keys](/img/80/c97410c88856479e6be9de67936790.png)
[proteus simulation] Arduino uno+ nixie tube display 4X4 keyboard matrix keys

mysql学习笔记--单张表上的增删改查

MySql安裝教程

Nacos practice record

Rebeco: using machine learning to predict stock crash risk

Collaboration + Security + storage, cloud box helps Shenzhen edetai restructure its data center

Self cultivation and learning encouragement

CVPR大会现场纪念孙剑博士,最佳学生论文授予同济阿里,李飞飞获黄煦涛纪念奖...

Introduction to CUDA Programming minimalist tutorial

CUDA编程入门极简教程
随机推荐
Winxp kernel driver debugging
Copilot免费时代结束!正式版67元/月,学生党和热门开源项目维护者可白嫖
Two way combination of business and technology to build a bank data security management system
Before the age of 36, Amazon transgender hackers were sentenced to 20 years' imprisonment for stealing data from more than 100million people!
ACM. Hj75 common substring calculation ●●
协作+安全+存储,云盒子助力深圳爱德泰重构数据中心
ASP. Net conference room booking applet source code booking applet source code
The sign in function completes 03 "IVX low code sign in system production"
Tencent Open Source Project "Yinglong" est devenu un projet Apache de haut niveau: l'ancien Service à long terme Wechat payment, peut maintenir un million de milliards de niveaux de traitement de flux
MySQL modifies and deletes tables in batches according to the table prefix
Wechat applet obtains the parameters carried after scanning the QR code
Is it safe to open an online stock account?
存算一体芯片离普及还有多远?听听从业者怎么说 | 对撞派 x 后摩智能
Gold medal scheme of kaggle patent matching competition post competition summary
股票开户,在手机上开户安全吗?
Performance rendering of dSPACE
How to click DOM to automatically locate the corresponding code line in vscode
Demonstration of combination of dream CAD cloud map and GIS
站在风暴中心:如何给飞奔中的腾讯更换引擎
We media do not know how to realize it? Sharing of 7 major realization methods