当前位置:网站首页>X86 CPU, critical! The latest vulnerability has caused heated discussion. Hackers can remotely steal keys. Intel "all processors" are affected
X86 CPU, critical! The latest vulnerability has caused heated discussion. Hackers can remotely steal keys. Intel "all processors" are affected
2022-06-25 03:41:00 【QbitAl】
Fish and sheep From the Aofei temple
qubits | official account QbitAI
x86 CPU, dangerous !
A new safety study shows that : In a country called Hertzbleed Under the attack mode of , Hackers can steal encryption keys directly from remote servers .
Whether it's Intel or AMD CPU, It's not immune .
The scope of influence is probably aunt sauce's .
Intel : All .
AMD:
The research came from research institutions such as the University of Texas at Austin and the University of Illinois at Urbana Champaign , Once the relevant papers were issued, they triggered a heated discussion .
What exactly happened , Let's study it carefully together .
in the light of DVFS The attack of
In cryptography , Power analysis It is a side channel attack method that has long existed .
for instance , By measuring the power consumed by the chip while processing data , Hackers can extract this encrypted data .
Fortunately, power analysis can not be realized remotely , The attack means are relatively limited .
But in Hertzbleed in , The researchers found that , Use dynamic voltage frequency scaling (DVFS), The power side channel attack can be transformed into a remote attack !
and DVFS, It is what major manufacturers are currently using to reduce CPU An important function of power consumption .
To be specific , The researchers found in the experiment , In some cases ,x86 The dynamic frequency scaling of the processor depends on the data being processed , Its particle size is milliseconds .
That is to say ,DVFS Caused by the CPU Frequency variation , It can be directly linked to the power consumption of data processing .
because CPU The difference in frequency can be converted into the difference in actual occurrence time , By monitoring the response time of the server , Attackers can observe this change remotely .
In the paper , The researchers are running SIKE( An encryption algorithm ) Tested on the server of Hertzbleed.
Results show , In an unoptimized attack version , They were in 36 Hours and 89 Within hours , Completely extracted Cloudflare Encryption library CIRCL And Microsoft PQCrypto-SIDH All keys in .
Intel &AMD: No patch
The researchers say , They are already in 2021 To Intel in the third quarter of 、Cloudflare And Microsoft disclosed the research . First quarter of this year , They also share AMD There was communication .
however , Intel and AMD There are no plans to patch this .
Intel senior director of secure communications and event response Jerry Bryant Think :
Although it is interesting from a research point of view , But we don't think this kind of attack is feasible outside the laboratory environment .
Intel rated the vulnerability as medium .
But Intel also mentioned in the announcement : Guidelines are being released to address this potential vulnerability .
While Microsoft and Cloudflare aspect , The encryption code base has been updated .
The researchers estimate that , These updates make CIRCL and PQCrypto-SIDH The cost of unpacking performance increases 5% and 11%.
They mentioned , Disable the frequency boost function , Intel's “Turbo Boost”、AMD Of “Turbo Core” etc. , Can ease Hertzbleed The problems brought about by , But this will have a bad impact on the system performance .
in addition , What's interesting is , The researchers revealed that , Intel did not issue a patch , But they were asked to postpone the release of the findings .
Reference link :
[1]https://www.hertzbleed.com/
[2]https://arstechnica.com/information-technology/2022/06/researchers-exploit-new-intel-and-amd-cpu-flaw-to-steal-encryption-keys/
— End —
Live registration | Arrayed optical waveguide :
Push AR The display technology of glasses going to the consumer market within three years
The development of metacosmic industry , Bringing together cutting-edge technologies , Build a new form of the next generation Internet . and AR equipment , Or will become the next generation of Internet “ Access level ” equipment .
Consumption level AR What is the core competitiveness of the equipment ?AR What is the technical principle of optical module ? How is its development ? Your first pair AR What will the device look like ?6 month 16 Japan , The live broadcast will be announced ~
Focus on me here , Remember to mark the star ~
边栏推荐
- 1-6 build win7 virtual machine environment
- 2022年海外电商运营三大关键讲解
- Is it safe for Guoxin golden sun to open an account in the steps of opening new bonds
- 后台页制作01《ivx低代码签到系统制作》
- Li Kou daily question - day 26 -506 Relative rank
- Introduction to CUDA Programming minimalist tutorial
- mysql学习笔记--单张表上的增删改查
- EasyNVR使用Onvif探测设备失败,显示“无数据”是什么原因?
- ASP.NET会议室预约小程序源码 预约小程序源码
- MySQL根据表前缀批量修改、删除表
猜你喜欢
IE寿终正寝,网友们搞起了真·墓碑……
孙武玩《魔兽》?有图有真相
Seata四大模式之TCC模式详解及代码实现
36岁前亚马逊变性黑客,窃取超1亿人数据被判20年监禁!
Single case of hungry and lazy mode
Self cultivation and learning encouragement
What if Alipay is controlled by risk for 7 days? Payment solution
20 years ICPC Macau station L - random permutation
Rebeco: using machine learning to predict stock crash risk
马斯克:推特要学习微信,让10亿人「活在上面」成为超级APP
随机推荐
Is it safe to open a stock account with the customer's haircut account link? Tell me what you know
現在,耳朵也要進入元宇宙了
The file attributes downloaded by the browser are protected. How to remove them
[FPGA] serial port controls temperature acquisition by command
Three key explanations of overseas e-commerce operation in 2022
About sizeof() and strlen in array
love
Tianshu night reading notes - 8.4 diskperf disassembly
Insurance app aging service evaluation analysis 2022 issue 06
DSPACE set zebra crossings and road arrows
Is it safe to open an account on the compass? Is it reliable?
Is it safe for tonghuashun securities to open an account
Solution of separating matlab main window and editor window into two interfaces
ACM. Hj75 common substring calculation ●●
The sign in function completes 03 "IVX low code sign in system production"
DateTimeFormat放到@RequestBody下是无效的
Two common OEE monitoring methods for equipment utilization
nacos实践记录
华为上诉失败,被禁止在瑞典销售 5G 设备;苹果公司市值重获全球第一;Deno 完成 2100 万美元 A 轮融资|极客头条
ACM. Hj70 matrix multiplication calculation amount estimation ●●