TLBleed attack puts Intel Hyper-Threading at risk

Posted on Tuesday, June 26 2018 @ 15:38 CEST by Thomas De Maesschalck
Intel logo
Last week OpenBSD disabled Intel's Hyper-Threading by default over fears of a new Spectre-class vulnerability. Now some more details emerged, it appears researchers at Vrije Universiteit Amsterdam in the Netherlands discovered a new side-channel vulnerability on Intel processors with hyperthreading. Called TLBleed, the vulnerability can allow data leaking from processes that share a physical core. The research focused on Intel CPUs but it's possible that AMD's processors are also vulnerable, as these chips also use a form of simultaneous multithreading (SMT).
In a proof of concept, researchers ran a program calculating cryptographic signatures using the Curve 25519 EdDSA algorithm implemented in libgcrypt on one logical core and their attack program on the other logical core. The attack program could determine the 256-bit encryption key used to calculate the signature with a combination of two milliseconds of observation, followed by 17 seconds of machine-learning-driven guessing and a final fraction of a second of brute-force guessing.
More details at ARS Technica, which concludes the overall impact here will likely be limited.


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments