TLBleed explained

TLBleed is a cryptographic side-channel attack that uses machine learning to exploit a timing side-channel via the translation look-aside buffer (TLB) on modern microprocessors that use simultaneous multithreading.[1], the attack has only been demonstrated experimentally on Intel processors; it is speculated that other processors may also potentially be vulnerable to a variant of the attack, but no proof of concept has been demonstrated.[2] AMD had indicated that their processors would not be vulnerable to this attack.[3]

The attack led to the OpenBSD project disabling simultaneous multithreading on Intel microprocessors.[4] [5] The OpenBSD project leader Theo de Raadt has stated that, while the attack could theoretically be addressed by preventing tasks with different security contexts from sharing physical cores, such a fix is currently impractical because of the complexity of the problem.[4]

See also

External links

Notes and References

  1. News: Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't worry about. Chris. Williams. 2018-06-25. en. 2018-06-22. The Register.
  2. News: Researchers warn of TLBleed Hyper-Threading vuln . bit-tech.net. 2018-06-25. en-GB. Gareth. Halfacree. June 25, 2018.
  3. News: Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't worry about. Chris. Williams. 2018-06-25. en. 2018-06-22. The Register.
  4. Web site: OpenBSD chief de Raadt says no easy fix for new Intel CPU bug. 25 June 2018. Varghese. Sam. www.itwire.com. en-gb. 2018-06-25.
  5. Web site: OpenBSD disables hyperthreading support for Intel CPUs due to likely data leaks. 21 June 2018. Varghese. Sam. www.itwire.com. en-gb. 2018-06-25.