NetSpectre / AVX2 timing side-channel attack
Baptiste Jonglez
baptiste at bitsofnetworks.org
Fri Jul 27 12:29:41 CEST 2018
Hi,
Here is an interesting side-channel attack that uses AVX2 timing to
potentially extract private key material (read section 4.2):
https://news.ycombinator.com/item?id=17621823
https://misc0110.net/web/files/netspectre.pdf
It is based on a power-saving feature: after being idle for 1 ms,
the AVX2 unit in Intel processors is powered off, which greatly increases
latency for the next AVX2 instruction.
Of course, to be exploited, the code would need to perform AVX2
instructions conditionnally. I'd be curious to know if it is the case in
Wireguard.
Baptiste
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.zx2c4.com/pipermail/wireguard/attachments/20180727/b59d7856/attachment.asc>
More information about the WireGuard
mailing list