Navigation
Recherche
|
Intel CPUs Impacted by New PortSmash Side-Channel Vulnerability
vendredi 2 novembre 2018, 17:01 , par Slashdot
Intel processors are impacted by a new vulnerability that can allow attackers to leak encrypted data from the CPU's internal processes. From a report: The new vulnerability, which has received the codename of PortSmash, has been discovered by a team of five academics from the Tampere University of Technology in Finland and Technical University of Havana, Cuba. Researchers have classified PortSmash as a side-channel attack. In computer security terms, a side-channel attack describes a technique used for leaking encrypted data from a computer's memory or CPU, which works by recording and analyzing discrepancies in operation times, power consumption, electromagnetic leaks, or even sound to gain additional info that may help break encryption algorithms and recovering the CPU's processed data. Researchers say PortSmash impacts all CPUs that use a Simultaneous Multithreading (SMT) architecture, a technology that allows multiple computing threads to be executed simultaneously on a CPU core. Researchers say they've already confirmed that PortSmash impacts Intel CPUs which support the company's Hyper-Threading (HT) technology, Intel's proprietary implementation of SMT.
Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/X1rENZ1XS0c/intel-cpus-impacted-by-new-portsmash-side-chann...
|
56 sources (32 en français)
Date Actuelle
jeu. 21 nov. - 20:45 CET
|