New AMD side channel attacks discovered, impacts Zen architecture

Source: Hacker News

Article note: Ooh. AMD's turn. Every AMD design since Bulldozer (2011) has a metadata-leaking behavior in their L1 data cache. PoC from Javascript in a browser (bad) but it appears to only leak metadata so it's slower and harder to extract useful information than the previous high-profile Meltdown/Specter type bugs (good). Also interesting, it sounds like the research was at least partially funded by Intel, which is probably "we were looking for bugs in x86 parts and Intel sponsored us because they're bounty-ing their vast side-channel problem to get ahead of it" but may be borderline industrial espionage to take the heat off.
Comments
This entry was posted in News. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *