Gonzalo Nemmi :runbsd: · @gnemmi
141 followers · 1771 posts · Server mastodon.sdf.org
ITSEC News · @itsecbot
1399 followers · 36285 posts · Server schleuss.online

Zenbleed: How the quest for CPU performance could put your passwords at risk - Parse this! "You need to turn on a special setting to stop the code you wrote to stop the... nakedsecurity.sophos.com/2023/ -2023-20593

#amd #ormandy #zenbleed #dataloss #vulnerability #cve #speculativeexecution

Last updated 1 year ago

GeekProjects News · @news
4 followers · 3116 posts · Server geekprojects.com
IT News · @itnewsbot
3165 followers · 258161 posts · Server schleuss.online

This Week in Security: Session Puzzling, Session Keys, and Speculation - Last week we briefly mentioned a vulnerability in the Papercut software, and more ... - hackaday.com/2023/04/28/this-w

#rdp #news #securityhacks #hackadaycolumns #thisweekinsecurity #speculativeexecution

Last updated 2 years ago

cynicalsecurity :cm_2: · @cynicalsecurity
939 followers · 3592 posts · Server bsd.network

For those interested in the number of ways Intel's SGX has been broken there is now a fine site:

sgx.fail

The introduction to the site reads:

Intel's Software Guard Extension (SGX) promises an isolated execution environment, protected from all software running on the machine. In the past few years, however, SGX has come under heavy fire, threatened by numerous side channel attacks. With Intel repeatedly patching SGX to regain security, we set out to explore the effectiveness of SGX's update mechanisms to prevent attacks on real-world deployments.

More specifically, we survey and categorize various SGX attacks, their applicability to different SGX architectures, as well as the information they leak. We then explored the effectiveness of SGX's update mechanisms in preventing attacks on two real-word deployments, the SECRET network and PowerDVD. In both cases, we show that these vendors are unable to meet the security goals originally envisioned for their products, presumably due to SGX's long update timelines and the complexities of a manual update process. This forces vendors to make a difficult security vs. usability trade off, resulting in security compromises.

#

#sgx #TrustedEnclaves #speculativeexecution #intel #PowerDVD

Last updated 2 years ago

cynicalsecurity :cm_2: · @cynicalsecurity
938 followers · 3591 posts · Server bsd.network

H. Xiao and S. Ainsworth, "Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers"¹

Side-channel attacks pose serious threats to many security models, especially sandbox-based browsers. While transient-execution side channels in out-of-order processors have previously been blamed for vulnerabilities such as Spectre and Meltdown, we show that in fact, the capability of out-of-order execution itself to cause mayhem is far more general.
We develop Hacky Racers, a new type of timing gadget that uses instruction-level parallelism, another key feature of out-of-order execution, to measure arbitrary fine-grained timing differences, even in the presence of highly restricted JavaScript sandbox environments. While such environments try to mitigate timing side channels by reducing timer precision and removing language features such as SharedArrayBuffer that can be used to indirectly generate timers via thread-level parallelism, no such restrictions can be designed to limit Hacky Racers. We also design versions of Hacky Racers that require no misspeculation whatsoever, demonstrating that transient execution is not the only threat to security from modern microarchitectural performance optimization.
We use Hacky Racers to construct novel backwards-in-time Spectre gadgets, which break many hardware countermeasures in the literature by leaking secrets before misspeculation is discovered. We also use them to generate the first known last-level cache eviction set generator in JavaScript that does not require SharedArrayBuffer support.

__
¹ arxiv.org/abs/2211.14647

#arxiv #researchpapers #OutOfOrderExecution #spectre #meltdown #speculativeexecution

Last updated 2 years ago

cynicalsecurity :cm_2: · @cynicalsecurity
938 followers · 3590 posts · Server bsd.network

H. Xiao and S. Ainsworth, "Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers"¹

Side-channel attacks pose serious threats to many security models, especially sandbox-based browsers. While transient-execution side channels in out-of-order processors have previously been blamed for vulnerabilities such as Spectre and Meltdown, we show that in fact, the capability of out-of-order execution itself to cause mayhem is far more general.
We develop Hacky Racers, a new type of timing gadget that uses instruction-level parallelism, another key feature of out-of-order execution, to measure arbitrary fine-grained timing differences, even in the presence of highly restricted JavaScript sandbox environments. While such environments try to mitigate timing side channels by reducing timer precision and removing language features such as SharedArrayBuffer that can be used to indirectly generate timers via thread-level parallelism, no such restrictions can be designed to limit Hacky Racers. We also design versions of Hacky Racers that require no misspeculation whatsoever, demonstrating that transient execution is not the only threat to security from modern microarchitectural performance optimization.
We use Hacky Racers to construct novel backwards-in-time Spectre gadgets, which break many hardware countermeasures in the literature by leaking secrets before misspeculation is discovered. We also use them to generate the first known last-level cache eviction set generator in JavaScript that does not require SharedArrayBuffer support.

#arxiv #researchpapers #OutOfOrderExecution #spectre #meltdown #speculativeexecution

Last updated 2 years ago

Tech News Worldwide · @TechNews
11303 followers · 97994 posts · Server aspiechattr.me

New working speculative execution attack sends Intel and AMD scrambling

arstechnica.com/?p=1865795

&IT

#speculativeexecution #biz #intel #CPUs #amd

Last updated 2 years ago

· @loveisgrief
79 followers · 2416 posts · Server mastodon.online

MIT researchers uncover ‘unpatchable’ flaw in chips

An evolution of the flaw (made possible by ") that bypasses the hardware level measure introduced to counter it called "pointer authentication code" .

techcrunch.com/2022/06/10/appl

#pac #speculativeexecution #spectre #m1 #apple

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de