Breaking News

Samsung Launches Onyx Cinema LED Screen for European Market at CineEurope 2025 GAMEMAX Introduces CLAW 360 and CLAW 460 Gaming Cases EnGenius Launches Cloud-Lite Switch Series MSI Redefines Productivity and Versatility with Its New 144Hz Business Monitor Razer announces Kishi V3 Lineup

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

AMD Downplays Reported Side Channel Vulnerabilities in Zen Chips

AMD Downplays Reported Side Channel Vulnerabilities in Zen Chips

PC components Mar 8,2020 0

AMD claims that the recently surfaced potential security exploits in the company's CPUs are not new speculation-based attacks.

A paper released by the Graz University of Technology detailed two new "Take A Way" attacks, Collide+Probe and Load+Reload, that can leak secret data from AMD processors by manipulating the L1D cache predictor. The researchers claim that the vulnerability impacts all AMD processors from 2011 to 2019.

Both exploit the "way predictor" for the Level 1 cache (meant to boost the efficiency of cache access) to leak memory content. The Collide+Probe attack lets an intruder monitor memory access without having to know physical addresses or shared memory, while Load+Reload is a more secretive method that uses shared memory without invalidating the cache line.

"We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+ Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last level-cache evictions."

The team took advantage of the flaws using JavaScript in common browsers like Chrome and Firefox. While Take A Way only exposes out a small amount of information compared to Meltdown or Spectre, that was enough for the investigators to access AES encryption keys.

It's possible to address the flaw through a mix of hardware and software, the researchers said, although it's not certain how much this would affect performance.

AMD posted the following statement no its website:

"We are aware of a new whitepaper that claims potential security exploits in AMD CPUs, whereby a malicious actor could manipulate a cache-related feature to potentially transmit user data in an unintended way. The researchers then pair this data path with known and mitigated software or speculative execution side channel vulnerabilities. AMD believes these are not new speculation-based attacks."

The advisory does not point to any mitigations for the attack in question, merely citing other mitigated speculative executions that were used as a vehicle to attack the L1D cache predictor.

Tags: AMDProcessorsSecurity
Previous Post
Australia Launches Federal Court Action Against Facebook
Next Post
AT&T, Palo Alto Networks and Broadcom Collaborate on a Disaggregated Scalable Firewall

Related Posts

  • AMD Introduces New Radeon Graphics Cards and Ryzen Threadripper Processors at COMPUTEX 2025

  • AMD Announces Press Conference at COMPUTEX 2025

  • ASUS Republic of Gamers Unveils Crosshair X870E Extreme, Apex Motherboards

  • ASRock gives more information about AMD CPUs and their products

  • ASRock and Asus announce Radeon RX 9070 XT and Radeon RX 9070 Graphics Cards

  • AMD Unveils Radeon RX 9000 Series Graphics Cards

  • ASRock AM5 Motherboards Now Fully Support AMD Ryzen 9 9950X3D & 9900X3D Processors

  • Intel-AMD new motherboards announced

Latest News

Samsung Launches Onyx Cinema LED Screen for European Market at CineEurope 2025
Consumer Electronics

Samsung Launches Onyx Cinema LED Screen for European Market at CineEurope 2025

GAMEMAX Introduces CLAW 360 and CLAW 460 Gaming Cases
Cooling Systems

GAMEMAX Introduces CLAW 360 and CLAW 460 Gaming Cases

EnGenius Launches Cloud-Lite Switch Series
Enterprise & IT

EnGenius Launches Cloud-Lite Switch Series

MSI Redefines Productivity and Versatility with Its New 144Hz Business Monitor
Enterprise & IT

MSI Redefines Productivity and Versatility with Its New 144Hz Business Monitor

Razer announces Kishi V3 Lineup
Smartphones

Razer announces Kishi V3 Lineup

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Arctic Liquid Freezer III 420 - 360

Arctic Liquid Freezer III 420 - 360

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Noctua NH-D15 G2

Noctua NH-D15 G2

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed