Breaking News

Levelplay Launches Combat Liquid HUD and Combat Liquid SE AIO CPU Coolers Intel Launches new Intel Xeon 600 Processors for Workstation Club 3D Announced their first new products of 2026 Samsung 2026 OLED TVs and Monitors Are NVIDIA G-SYNC Compatible for Elite Gaming Performance Kioxia and Sandisk Extend Yokkaichi Joint Venture Agreement Through 2034

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

AMD Downplays Reported Side Channel Vulnerabilities in Zen Chips

AMD Downplays Reported Side Channel Vulnerabilities in Zen Chips

PC components Mar 8,2020 0

AMD claims that the recently surfaced potential security exploits in the company's CPUs are not new speculation-based attacks.

A paper released by the Graz University of Technology detailed two new "Take A Way" attacks, Collide+Probe and Load+Reload, that can leak secret data from AMD processors by manipulating the L1D cache predictor. The researchers claim that the vulnerability impacts all AMD processors from 2011 to 2019.

Both exploit the "way predictor" for the Level 1 cache (meant to boost the efficiency of cache access) to leak memory content. The Collide+Probe attack lets an intruder monitor memory access without having to know physical addresses or shared memory, while Load+Reload is a more secretive method that uses shared memory without invalidating the cache line.

"We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+ Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last level-cache evictions."

The team took advantage of the flaws using JavaScript in common browsers like Chrome and Firefox. While Take A Way only exposes out a small amount of information compared to Meltdown or Spectre, that was enough for the investigators to access AES encryption keys.

It's possible to address the flaw through a mix of hardware and software, the researchers said, although it's not certain how much this would affect performance.

AMD posted the following statement no its website:

"We are aware of a new whitepaper that claims potential security exploits in AMD CPUs, whereby a malicious actor could manipulate a cache-related feature to potentially transmit user data in an unintended way. The researchers then pair this data path with known and mitigated software or speculative execution side channel vulnerabilities. AMD believes these are not new speculation-based attacks."

The advisory does not point to any mitigations for the attack in question, merely citing other mitigated speculative executions that were used as a vehicle to attack the L1D cache predictor.

Tags: AMDProcessorsSecurity
Previous Post
Australia Launches Federal Court Action Against Facebook
Next Post
AT&T, Palo Alto Networks and Broadcom Collaborate on a Disaggregated Scalable Firewall

Related Posts

  • AMD at CES 2026

  • ASUS Announces Turbo Radeon AI Pro R9700 32GB Graphics Card

  • AMD Introduces EPYC Embedded 4005 Processors for Low-Latency Applications at the Edge

  • AMD announces Instinct MI350 Series GPUs

  • IBM and AMD Join Forces to Build the Future of Computing

  • AMD Introduces New Radeon Graphics Cards and Ryzen Threadripper Processors at COMPUTEX 2025

  • AMD Announces Press Conference at COMPUTEX 2025

  • ASUS Republic of Gamers Unveils Crosshair X870E Extreme, Apex Motherboards

Latest News

Levelplay Launches Combat Liquid HUD and Combat Liquid SE AIO CPU Coolers
Cooling Systems

Levelplay Launches Combat Liquid HUD and Combat Liquid SE AIO CPU Coolers

Intel Launches new Intel Xeon 600 Processors for Workstation
Enterprise & IT

Intel Launches new Intel Xeon 600 Processors for Workstation

Club 3D Announced their first new products of 2026
Consumer Electronics

Club 3D Announced their first new products of 2026

Samsung 2026 OLED TVs and Monitors Are NVIDIA G-SYNC Compatible for Elite Gaming Performance
Consumer Electronics

Samsung 2026 OLED TVs and Monitors Are NVIDIA G-SYNC Compatible for Elite Gaming Performance

Kioxia and Sandisk Extend Yokkaichi Joint Venture Agreement Through 2034
Enterprise & IT

Kioxia and Sandisk Extend Yokkaichi Joint Venture Agreement Through 2034

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed