[16970] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Adi Shamir "timing attack" quote

daemon@ATHENA.MIT.EDU (Michael_Heyman@McAfee.com)
Thu Mar 3 14:33:59 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Michael_Heyman@McAfee.com
Date: Tue, 22 Feb 2005 14:58:06 -0500
To: <cryptography@metzdowd.com>


In the "Gates not his cocky self at RSA conference" Roger Smith article,
the author says:=20
  [Adi Shamir] cautioned that many of the current generation of=20
  Intel processors that use multi-threading and multi-core=20
  technology seem to be vulnerable to timing attacks that can=20
  use unprivileged threads to find keys stored in their caches.

I hadn't known that one process could read the memory of a second
process running on a different hyper-thread or a different core through
a cleverly timed cache hits (which is what I think this sentence says).
Does anyone have further information on this or mitigation strategies?

-Michael Heyman

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post