K
keith
The social engineer who needs your personal information to
"verify" your account...
Ok, you got me. What weakness in DES does that expose? A potential
security weakness, sure.
The social engineer who needs your personal information to
"verify" your account...
Colin Andrew Percival said:And, predictably, they completely missed the point.
A good idea, but irrelevant to this attack.
A good idea, but fails to recognize that my attack can also obtain
information from non-cryptographic processes which use non-oblivious
algorithms. Cryptography is a big target, but certainly not the only
one.
Completely irrelevant. Dual-core processors are no more affected by this
than single-core processors, and far less than hyperthreaded processors.
Colin said:Completely irrelevant. Dual-core processors are no more affected by this
than single-core processors, and far less than hyperthreaded processors.
Can the cache be shared by separate processes?What's that Gartner said about Intel being able to demonstrate this
attack even on single-threaded processors? It seems nearly impossible to
do this with only one thread running at a time.
Tom Linden said:Can the cache be shared by separate processes?
In comp.arch Yousuf Khan said:What's that Gartner said about Intel being able to demonstrate this
attack even on single-threaded processors?
It seems nearly impossible to
do this with only one thread running at a time.
Colin said:If you can provoke lots and lots of context switches, it might be
possible to steal a key by taking advantage of information leakage
across context switches. As I discuss in my paper, this provides
a very easy covert channel, but it is not clear if it can actually
be used to steal keys.
Colonel said:Well, then, what do you think about simply splitting the cache
among cores? It really depends on how workload gets allocated.
If each core ends up with a roughly equivalent working set of
cached storage, why bother with an elaborate protection scheme
when you can just split and firewall it?
Precisely, and what did you do about it? Nothing, because the bandwidthugh ... nearly 40 years ago as an undergraudate
. .. i started doing a bunch of work on page replacement algorithms
http://www.garlic.com/~lynn/subtopic.html#wsclock
on multi-user timesharing systems
http://www.garlic.com/~lynn/subtopic.html#timeshare
that was being turned around and shipped in commercial systems,
actually, i was also doing the generalized resource scheduling
algorithms that also were being shipped in commercial systems
http://www.garlic.com/~lynn/subtopic.html#fairshare
... anyway ... I was asked several times about the problem of
low-bandidth information leakage and what was I going to do about it.
Now, one thing that puzzles me is how does a thread read directly from
a cache? My assumption was that the cache was transparent to the
software. All a software can do is generate a memory address, which is
then redirected through the cache; but it can't ask for as specific
location inside the cache. The processor cache maintains hash tables to
prevent similar-looking memory addresses from being sent to the wrong
thread.