MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
attacks
Recherche

[$] Constant-time instructions and processor optimizations

vendredi 3 février 2023, 16:18 , par LWN.net
Of all the attacks on cryptographic code, timing attacks may be among the
most insidious. An algorithm that appears to be coded correctly, perhaps
even with a formal proof of its correctness, may be undermined by
information leaked as the result of data-dependent timing differences.
Both Arm and Intel have introduced modes that are intended to help defend
against timing attacks, but the extent to which those modes should be used
in the kernel is still under discussion.
https://lwn.net/Articles/921511/
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Date Actuelle
ven. 19 avril - 23:00 CEST