当前位置:网站首页>X86 CPU, critical! The latest vulnerability has caused heated discussion. Hackers can remotely steal keys. Intel "all processors" are affected
X86 CPU, critical! The latest vulnerability has caused heated discussion. Hackers can remotely steal keys. Intel "all processors" are affected
2022-06-25 03:41:00 【QbitAl】
Fish and sheep From the Aofei temple
qubits | official account QbitAI
x86 CPU, dangerous !
A new safety study shows that : In a country called Hertzbleed Under the attack mode of , Hackers can steal encryption keys directly from remote servers .
Whether it's Intel or AMD CPU, It's not immune .
The scope of influence is probably aunt sauce's .
Intel : All .

AMD:

The research came from research institutions such as the University of Texas at Austin and the University of Illinois at Urbana Champaign , Once the relevant papers were issued, they triggered a heated discussion .

What exactly happened , Let's study it carefully together .
in the light of DVFS The attack of
In cryptography , Power analysis It is a side channel attack method that has long existed .
for instance , By measuring the power consumed by the chip while processing data , Hackers can extract this encrypted data .
Fortunately, power analysis can not be realized remotely , The attack means are relatively limited .
But in Hertzbleed in , The researchers found that , Use dynamic voltage frequency scaling (DVFS), The power side channel attack can be transformed into a remote attack !
and DVFS, It is what major manufacturers are currently using to reduce CPU An important function of power consumption .
To be specific , The researchers found in the experiment , In some cases ,x86 The dynamic frequency scaling of the processor depends on the data being processed , Its particle size is milliseconds .
That is to say ,DVFS Caused by the CPU Frequency variation , It can be directly linked to the power consumption of data processing .
because CPU The difference in frequency can be converted into the difference in actual occurrence time , By monitoring the response time of the server , Attackers can observe this change remotely .

In the paper , The researchers are running SIKE( An encryption algorithm ) Tested on the server of Hertzbleed.
Results show , In an unoptimized attack version , They were in 36 Hours and 89 Within hours , Completely extracted Cloudflare Encryption library CIRCL And Microsoft PQCrypto-SIDH All keys in .
Intel &AMD: No patch
The researchers say , They are already in 2021 To Intel in the third quarter of 、Cloudflare And Microsoft disclosed the research . First quarter of this year , They also share AMD There was communication .
however , Intel and AMD There are no plans to patch this .
Intel senior director of secure communications and event response Jerry Bryant Think :
Although it is interesting from a research point of view , But we don't think this kind of attack is feasible outside the laboratory environment .
Intel rated the vulnerability as medium .

But Intel also mentioned in the announcement : Guidelines are being released to address this potential vulnerability .
While Microsoft and Cloudflare aspect , The encryption code base has been updated .
The researchers estimate that , These updates make CIRCL and PQCrypto-SIDH The cost of unpacking performance increases 5% and 11%.
They mentioned , Disable the frequency boost function , Intel's “Turbo Boost”、AMD Of “Turbo Core” etc. , Can ease Hertzbleed The problems brought about by , But this will have a bad impact on the system performance .
in addition , What's interesting is , The researchers revealed that , Intel did not issue a patch , But they were asked to postpone the release of the findings .
Reference link :
[1]https://www.hertzbleed.com/
[2]https://arstechnica.com/information-technology/2022/06/researchers-exploit-new-intel-and-amd-cpu-flaw-to-steal-encryption-keys/
— End —
Live registration | Arrayed optical waveguide :
Push AR The display technology of glasses going to the consumer market within three years
The development of metacosmic industry , Bringing together cutting-edge technologies , Build a new form of the next generation Internet . and AR equipment , Or will become the next generation of Internet “ Access level ” equipment .
Consumption level AR What is the core competitiveness of the equipment ?AR What is the technical principle of optical module ? How is its development ? Your first pair AR What will the device look like ?6 month 16 Japan , The live broadcast will be announced ~

Focus on me here , Remember to mark the star ~
边栏推荐
- There is the word "Internet" in the concept of industrial Internet, but it is an existence that is not related to the Internet
- Is it safe for tonghuashun securities to open an account
- DSPACE设置斑马线和道路箭头
- MCN institutions are blooming everywhere: bloggers and authors should sign contracts carefully, and the industry is very deep
- Expressing the transformation of two coordinate systems with vectors
- @PostConstruct
- 力扣每日一题-第26天-506.相对名次
- Before the age of 36, Amazon transgender hackers were sentenced to 20 years' imprisonment for stealing data from more than 100million people!
- AI自己写代码让智能体进化!OpenAI的大模型有“人类思想”那味了
- 14 BS object Node name Name attrs string get node name attribute content
猜你喜欢

Easy to use dictionary -defaultdict

陆奇首次出手投资量子计算

MySql安装教程
![[proteus simulation] Arduino uno+ nixie tube display 4X4 keyboard matrix keys](/img/80/c97410c88856479e6be9de67936790.png)
[proteus simulation] Arduino uno+ nixie tube display 4X4 keyboard matrix keys

The era of copilot free is over! Student party and defenders of popular open source projects can prostitute for nothing

20年ICPC澳门站L - Random Permutation

XML建模

DSPACE set zebra crossings and road arrows

MySQL learning notes -- addition, deletion, modification and query on a single table

XML modeling
随机推荐
EasyNVR使用Onvif探测设备失败,显示“无数据”是什么原因?
股票开户,在手机上开户安全吗?
在华泰证券上面开股票账户好不好,安不安全?
20 years ICPC Macau station L - random permutation
2点睡10点起不算熬夜?除非你每天都能执行
Background page production 01 production of IVX low code sign in system
VSCode中如何实现点击DOM自动定位到相应代码行
Add in cmakelists_ Definitions() function
马斯克被诉传销索赔2580亿美元,台积电公布2nm制程,中科院发现月壤中含有羟基形式的水,今日更多大新闻在此...
automated testing
How to choose a securities company when opening an account with a compass? Which is safer
MySql安装教程
Is it safe to open an account on the compass? Is it reliable?
MySQL learning notes -- addition, deletion, modification and query on a single table
20年ICPC澳门站L - Random Permutation
C语言数组与结构体指针
The release function completed 02 "IVX low code sign in system production"
redis
股票开户用客户经理发的开户链接安全吗?知道的给说一下吧
MySQL installation tutorial