NetSpectre / AVX2 timing side-channel attack
baptiste at bitsofnetworks.org
Fri Jul 27 12:29:41 CEST 2018
Here is an interesting side-channel attack that uses AVX2 timing to
potentially extract private key material (read section 4.2):
It is based on a power-saving feature: after being idle for 1 ms,
the AVX2 unit in Intel processors is powered off, which greatly increases
latency for the next AVX2 instruction.
Of course, to be exploited, the code would need to perform AVX2
instructions conditionnally. I'd be curious to know if it is the case in
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: not available
More information about the WireGuard