NetSpectre / AVX2 timing side-channel attack

Baptiste Jonglez baptiste at
Fri Jul 27 12:29:41 CEST 2018


Here is an interesting side-channel attack that uses AVX2 timing to
potentially extract private key material (read section 4.2):

It is based on a power-saving feature: after being idle for 1 ms,
the AVX2 unit in Intel processors is powered off, which greatly increases
latency for the next AVX2 instruction.

Of course, to be exploited, the code would need to perform AVX2
instructions conditionnally.  I'd be curious to know if it is the case in

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <>

More information about the WireGuard mailing list