Allow me to summarize x86 side channel attacks: Spectre v1: speculation is insecure by design Spectre v2: secure branch prediction matters Meltdown: Intel are dumbasses L1TF: Intel are monumental, inexcusable dumbasses PortSmash: hyperthreading is insecure by design
Rowhammer has been solved, BTW. There are algorithms that can be used to proactively refresh vulnerable rows. Combined with faster refresh intervals, it's an effective mitigation.
-
-
Anyway I'm saying Intel are morons. I'm not saying Intel engineers are morons. This is clearly an institutional problem with lack of communication between HW and SW, and lack of consideration for security. I have little doubt this was a result of overall culture, not individuals.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
if you mean TRR, then, that is trivial to bypass (we did early this year) we even bypassed it while running with doubled refresh rate... so, maybe it is solved, but not the way you describe here ;)
-
Yeah I am not sure how we solve rowhammer within current economic constraints. Memory controller is probably the best place to do it.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.