AMD 2011~2019 處理器漏洞 - 3C
By Caitlin
at 2020-03-08T19:46
at 2020-03-08T19:46
Table of Contents
※ 引述《inthepeace (peace)》之銘言:
: 原文在此
: https://www.tomshardware.com/news/new-amd-side-channel-attacks-discovered-impa
: cts-zen-architecture
: Google 翻譯
: 格拉茨技術大學發布的一篇新論文詳細介紹了兩種新的“ Take A Way”攻擊,即Collide
: + Probe和Load + Reload,它們可以通過操縱L1D緩存預測變量來洩漏AMD處理器的秘密
: 數據。 研究人員聲稱,該漏洞從2011年到2019年影響所有AMD處理器,這意味著Zen微體
: 系結構也受到影響。
: 好啦,這下開心啦
: 開放c52 723來留言
AMD 回復於此
https://www.amd.com/en/corporate/product-security
Take A Way
3/7/20
We are aware of a new white paper that claims potential security exploits in
AMD CPUs, whereby a malicious actor could manipulate a cache-related feature
to potentially transmit user data in an unintended way. The researchers then
pair this data path with known and mitigated software or speculative
execution side channel vulnerabilities. AMD believes these are not new
speculation-based attacks.
AMD continues to recommend the following best practices to help mitigate
against side-channel issues:
‧Keeping your operating system up-to-date by operating at the latest version
revisions of platform software and firmware, which include existing
mitigations for speculation-based vulnerabilities
‧Following secure coding methodologies
Implementing the latest patched versions of critical libraries, including
those susceptible to side channel attacks
‧Utilizing safe computer practices and running antivirus software
亂翻一通:
Take a way
3/7/20
我們知道最近有一篇論文聲稱AMD的CPU有潛在的安全漏洞。惡意攻擊者有可能藉由操作某
個和快取相關的功能來經由非正規管道傳輸使用者資料。接著,該研究人員將此資料傳輸
路徑和已知且已被修復的軟體或理論式執行端通道弱點(speculative execution side
channel vulnerabilities)搭配在一起。AMD相信這些並不是新的speculation-based
attacks。
AMD持續建議採用以下best practice保護電腦 bla bla bla....
--
: 原文在此
: https://www.tomshardware.com/news/new-amd-side-channel-attacks-discovered-impa
: cts-zen-architecture
: Google 翻譯
: 格拉茨技術大學發布的一篇新論文詳細介紹了兩種新的“ Take A Way”攻擊,即Collide
: + Probe和Load + Reload,它們可以通過操縱L1D緩存預測變量來洩漏AMD處理器的秘密
: 數據。 研究人員聲稱,該漏洞從2011年到2019年影響所有AMD處理器,這意味著Zen微體
: 系結構也受到影響。
: 好啦,這下開心啦
: 開放c52 723來留言
AMD 回復於此
https://www.amd.com/en/corporate/product-security
Take A Way
3/7/20
We are aware of a new white paper that claims potential security exploits in
AMD CPUs, whereby a malicious actor could manipulate a cache-related feature
to potentially transmit user data in an unintended way. The researchers then
pair this data path with known and mitigated software or speculative
execution side channel vulnerabilities. AMD believes these are not new
speculation-based attacks.
AMD continues to recommend the following best practices to help mitigate
against side-channel issues:
‧Keeping your operating system up-to-date by operating at the latest version
revisions of platform software and firmware, which include existing
mitigations for speculation-based vulnerabilities
‧Following secure coding methodologies
Implementing the latest patched versions of critical libraries, including
those susceptible to side channel attacks
‧Utilizing safe computer practices and running antivirus software
亂翻一通:
Take a way
3/7/20
我們知道最近有一篇論文聲稱AMD的CPU有潛在的安全漏洞。惡意攻擊者有可能藉由操作某
個和快取相關的功能來經由非正規管道傳輸使用者資料。接著,該研究人員將此資料傳輸
路徑和已知且已被修復的軟體或理論式執行端通道弱點(speculative execution side
channel vulnerabilities)搭配在一起。AMD相信這些並不是新的speculation-based
attacks。
AMD持續建議採用以下best practice保護電腦 bla bla bla....
--
Tags:
3C
All Comments
By Carol
at 2020-03-12T07:38
at 2020-03-12T07:38
By Zora
at 2020-03-13T13:04
at 2020-03-13T13:04
By Madame
at 2020-03-16T09:24
at 2020-03-16T09:24
By Carol
at 2020-03-17T05:59
at 2020-03-17T05:59
By Audriana
at 2020-03-19T01:09
at 2020-03-19T01:09
By Tom
at 2020-03-21T16:14
at 2020-03-21T16:14
By Charlie
at 2020-03-22T14:51
at 2020-03-22T14:51
By Eartha
at 2020-03-25T05:51
at 2020-03-25T05:51
By Lily
at 2020-03-26T14:36
at 2020-03-26T14:36
By Dora
at 2020-03-31T00:00
at 2020-03-31T00:00
By Enid
at 2020-04-04T05:24
at 2020-04-04T05:24
By Edith
at 2020-04-08T16:19
at 2020-04-08T16:19
By Isla
at 2020-04-13T13:44
at 2020-04-13T13:44
By Quanna
at 2020-04-16T21:17
at 2020-04-16T21:17
By Emily
at 2020-04-19T21:28
at 2020-04-19T21:28
By Dora
at 2020-04-23T04:20
at 2020-04-23T04:20
By Lily
at 2020-04-26T13:34
at 2020-04-26T13:34
By Dinah
at 2020-04-29T17:10
at 2020-04-29T17:10
By Enid
at 2020-05-03T02:41
at 2020-05-03T02:41
By Skylar Davis
at 2020-05-03T14:37
at 2020-05-03T14:37
By Isabella
at 2020-05-07T16:02
at 2020-05-07T16:02
By Bennie
at 2020-05-12T05:11
at 2020-05-12T05:11
By Ina
at 2020-05-16T11:08
at 2020-05-16T11:08
By William
at 2020-05-19T14:47
at 2020-05-19T14:47
By Dorothy
at 2020-05-20T13:25
at 2020-05-20T13:25
By Frederica
at 2020-05-25T08:02
at 2020-05-25T08:02
By Noah
at 2020-05-29T17:13
at 2020-05-29T17:13
By Andy
at 2020-06-02T22:03
at 2020-06-02T22:03
By Jake
at 2020-06-03T15:35
at 2020-06-03T15:35
By Ursula
at 2020-06-04T14:17
at 2020-06-04T14:17
By Skylar DavisLinda
at 2020-06-07T07:48
at 2020-06-07T07:48
By Charlie
at 2020-06-08T13:09
at 2020-06-08T13:09
By Joe
at 2020-06-08T17:00
at 2020-06-08T17:00
By Daniel
at 2020-06-11T04:34
at 2020-06-11T04:34
By Eden
at 2020-06-11T14:20
at 2020-06-11T14:20
By Dinah
at 2020-06-12T19:03
at 2020-06-12T19:03
By Tracy
at 2020-06-14T04:16
at 2020-06-14T04:16
By Ula
at 2020-06-19T04:08
at 2020-06-19T04:08
By Dorothy
at 2020-06-19T05:37
at 2020-06-19T05:37
By Emily
at 2020-06-19T07:05
at 2020-06-19T07:05
By Jack
at 2020-06-22T07:50
at 2020-06-22T07:50
By Margaret
at 2020-06-24T18:36
at 2020-06-24T18:36
Related Posts
AMD 2011~2019 處理器漏洞
By Blanche
at 2020-03-08T19:21
at 2020-03-08T19:21
150K 數據分析機
By George
at 2020-03-08T17:32
at 2020-03-08T17:32
Herman Miller Aeron 2.0 基本款星光賞
By Olivia
at 2020-03-08T15:34
at 2020-03-08T15:34
黃色鬼屋 ROG PG279Q $10938
By Aaliyah
at 2020-03-08T12:35
at 2020-03-08T12:35
求推薦雙面的m.2散熱片
By Quintina
at 2020-03-08T12:14
at 2020-03-08T12:14