[16970] in cryptography@c2.net mail archive
Adi Shamir "timing attack" quote
daemon@ATHENA.MIT.EDU (Michael_Heyman@McAfee.com)
Thu Mar 3 14:33:59 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Michael_Heyman@McAfee.com
Date: Tue, 22 Feb 2005 14:58:06 -0500
To: <cryptography@metzdowd.com>
In the "Gates not his cocky self at RSA conference" Roger Smith article,
the author says:=20
[Adi Shamir] cautioned that many of the current generation of=20
Intel processors that use multi-threading and multi-core=20
technology seem to be vulnerable to timing attacks that can=20
use unprivileged threads to find keys stored in their caches.
I hadn't known that one process could read the memory of a second
process running on a different hyper-thread or a different core through
a cleverly timed cache hits (which is what I think this sentence says).
Does anyone have further information on this or mitigation strategies?
-Michael Heyman
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com