While it's great to see that someone put together exploit code for this, it's not a new discovery: I described this attack in 2005 when I first exposed the dangers of shared resources in Intel Hyperthreading.
A `secret` modifier wouldn't make the code any easier to write in that respect. @deiandelmars worked on a compiler that transformed regular branchy code into constant-time code, if that's what you're looking for: http://cseweb.ucsd.edu/~dstefan/pubs/cauligi:2017:fact.pdf …
-
-
We’ll have the long version of this paper out soon! (w user studies, ports, etc.)
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.