This is awesome research, but don't panic. ;] SMT isn't evil here... Fundamentally, secret-dependent control flow has been specifically discouraged and avoided in "constant-time" crypto code for a while now. Upgrade your crypto libraries! The crypto community is really on this.https://twitter.com/CesarPereidaG/status/1058296725419507712 …
-
-
Replying to @chandlerc1024
SMT is definitely evil here. Constant time may work for crypto, but it does not work for computing in general. Sure, crypto keys are high value and deserve extra protection... but that just means SMT will leak everything except your crypto keys.
1 reply 0 retweets 3 likes -
Replying to @marcan42
If that is your concern, this is still just a drop in the bucket IMO. There are many, many side channels. But leaking data through side channels from one process to another is far from easy (even on a shared phys core, regardless of channel)... Not much worth it beyond key data.
1 reply 0 retweets 0 likes -
Replying to @chandlerc1024 @marcan42
Also, unless you're using VMs, truly malicious code on your physical core is .... a much bigger problem. And if you *are* using VMs, all the major cloud vendors have already isolated your core. All the non cloud VM stacks are on it too. L1TF makes this risk look tiny.
1 reply 0 retweets 1 like -
Replying to @chandlerc1024
Containers come to mind. Also, plenty of on-premise VM stuff isn't doing proper core isolation. And in general any multiuser systems. We rely on untrusted code not escaping OS privilege boundaries all the time.
1 reply 0 retweets 2 likes -
Replying to @marcan42
Yes, but in all of those cases is *this* even close to the most serious risk considering it is limited to info leak, high difficulty, low bandwidth, inability to target arbitrary data, etc....? Outside of very specific areas (crypto, maybe a few others) this shouldn't be a prio.
1 reply 0 retweets 0 likes -
Replying to @chandlerc1024
The problem with that mindset is you think you're ~safe until your not and someone comes up with a high impact exploit for your platform. The stars align and you're truly screwed.
2 replies 0 retweets 0 likes -
Replying to @marcan42 @chandlerc1024
But that’s true about literally everything, not just SMT.
1 reply 0 retweets 0 likes
Yes, but we usually try to mitigate known vulnerabilities instead of shrugging them off and saying "eh, nobody will find a way to exploit this".
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.