Title: Port Contention for Fun and Profit
Authors: Alejandro Cabrera Aldaya and Billy Bob Brumley and Sohaib ul Hassan and Cesar Pereida García and Nicola Tuveri
Venue: 40th IEEE Symposium on Security and Privacy, S&P 2019 (Oakland), San Francisco, CA, USA, May 20-22, 2019
NEW: Intel CPUs impacted by new PortSmash side-channel vulnerability.
Vulnerability confirmed on Skylake and Kaby Lake CPU series. Researchers suspect AMD processors are also impacted.https://t.co/Omn4pTrPIb pic.twitter.com/9oDOLEvcOh
— Catalin Cimpanu (@campuscodi) November 2, 2018
New PortSmash Hyper-Threading CPU Vuln Can Steal Decryption Keys – by @LawrenceAbramshttps://t.co/Z9DQJcWcQR
— BleepingComputer (@BleepinComputer) November 3, 2018
PortSmash, as the latest attack targeting our processors is being called, exploits a largely overlooked side-channel in Intel’s hyperthreading technology. https://t.co/5RlhZBzsuJ
— Ars Technica (@arstechnica) November 5, 2018
Allow me to summarize x86 side channel attacks:
Spectre v1: speculation is insecure by design
Spectre v2: secure branch prediction matters
Meltdown: Intel are dumbasses
L1TF: Intel are monumental, inexcusable dumbasses
PortSmash: hyperthreading is insecure by design— Hector Martin (@marcan42) November 2, 2018