A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees:
Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack — two well-known attacks that have been revealed at the start of the year and found to impact CPUs models going back to 1995. Researchers say they’ve discovered the seven new CPU attacks while performing “a sound and extensible systematization of transient execution attacks” — a catch-all term the research team used to describe attacks on the various internal mechanisms that a CPU uses to process data, such as the speculative execution process, the CPU’s internal caches, and other internal execution stages. The research team says they’ve successfully demonstrated all seven attacks with proof-of-concept code. Experiments to confirm six other Meltdown-attacks did not succeed, according to a graph published by researchers.
Well. This isn’t good. It’s a safe bet that people at ARM, AMD, and Intel are scrambling to verify if these attacks are fixable and how fast they can get those fixes out to the public.
Fun times….
Like this:
Like Loading...
Related
This entry was posted on November 14, 2018 at 4:16 pm and is filed under Commentary with tags AMD, ARM, Intel. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Oh Noes! Seven New Meltdown And Spectre Style CPU Attacks Found!
A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees:
Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack — two well-known attacks that have been revealed at the start of the year and found to impact CPUs models going back to 1995. Researchers say they’ve discovered the seven new CPU attacks while performing “a sound and extensible systematization of transient execution attacks” — a catch-all term the research team used to describe attacks on the various internal mechanisms that a CPU uses to process data, such as the speculative execution process, the CPU’s internal caches, and other internal execution stages. The research team says they’ve successfully demonstrated all seven attacks with proof-of-concept code. Experiments to confirm six other Meltdown-attacks did not succeed, according to a graph published by researchers.
Well. This isn’t good. It’s a safe bet that people at ARM, AMD, and Intel are scrambling to verify if these attacks are fixable and how fast they can get those fixes out to the public.
Fun times….
Share this:
Like this:
Related
This entry was posted on November 14, 2018 at 4:16 pm and is filed under Commentary with tags AMD, ARM, Intel. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.