Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.

Intel CPU security bug

[es] :: Kernel i OS programiranje :: Intel CPU security bug

Strane: << < .. 5 6 7 8 9 10

[ Pregleda: 87352 | Odgovora: 191 ] > FB > Twit

Postavi temu Odgovori

Autor

Pretraga teme: Traži
Markiranje Štampanje RSS

nkrgovic
Nikola Krgović
Beograd

Član broj: 3534
Poruke: 2315

ICQ: 49345867
Sajt: https://www.twinstarsyste..


+455 Profil

icon Re: Intel CPU security bug17.05.2019. u 17:33 - pre 32 dana i 8h
VLIW, ovo nesto kao Itanic? :) hmmm.... nema out of order... hmm.... hm.... :D
Please do not feed the Trolls!

Profesionalni sport je oksimoron. Profesionalni sportista je, najcesce, samo moron.
 
Odgovor na temu

Branimir Maksimovic

Član broj: 64947
Poruke: 2510
109.72.51.*



+551 Profil

icon Re: Intel CPU security bug25.05.2019. u 17:47 - pre 24 dana i 8h
Mislim da je ideja dosta dobra, samo je pitanje da li ce to ikada zaziveti, tim pre sto likovi koji ovo rade i nemaju bas neke resurse.
Nego da se vratimo na Intel:
https://www.techspot.com/artic...d-is-intel-no-hyper-threading/
Citat:

As we've come to learn recently, there are four new hardware vulnerabilities that affect Intel processors. These new flaws allow attackers to leak confidential data by exploiting microarchitectural data sampling (MDS) side-channel vulnerabilities, of which the most serious is arguably 'ZombieLoad'.

Unlike previous speculative execution flaws that partially affected AMD and Arm-based processors, the MDS flaws are exclusive to Intel chips. In the short term the only way to mitigate or minimize these vulnerabilities is to disable simultaneous multithreading (SMT), or as Intel brands it "Hyper-Threading."

As it stands Microsoft is pushing out OS-level updates to address the four MDS vulnerabilities and you’ll get those with this month's Windows 10 1903 update. However, this doesn’t mitigate the problem entirely, for that we need motherboard BIOS updates and reportedly Intel has released the new microcode to motherboard partners. However as of writing no new BIOS revisions have been released to the public. We believe we can test a worst case scenario by disabling Hyper-Threading and for older platforms that won’t get updated this might end up being the only solution.


press any key to continue or any other to quit....
 
Odgovor na temu

nkrgovic
Nikola Krgović
Beograd

Član broj: 3534
Poruke: 2315

ICQ: 49345867
Sajt: https://www.twinstarsyste..


+455 Profil

icon Re: Intel CPU security bug25.05.2019. u 18:49 - pre 24 dana i 7h

Please do not feed the Trolls!

Profesionalni sport je oksimoron. Profesionalni sportista je, najcesce, samo moron.
 
Odgovor na temu

Branimir Maksimovic

Član broj: 64947
Poruke: 2510
109.72.51.*



+551 Profil

icon Re: Intel CPU security bug01.06.2019. u 01:28 - pre 18 dana
I jos jedan...
https://arxiv.org/abs/1905.12701

Citat:

Recently, out-of-order execution, an important performance optimization in modern high-end processors, has been revealed to pose a significant security threat, allowing information leaks across security domains. In particular, the Meltdown attack leaks information from the operating system kernel to user space, completely eroding the security of the system. To address this and similar attacks, without incurring the performance costs of software countermeasures, Intel includes hardware-based defenses in its recent Coffee Lake R processors.
In this work, we show that the recent hardware defenses are not sufficient. Specifically, we present Fallout, a new transient execution attack that leaks information from a previously unexplored microarchitectural component called the store buffer. We show how unprivileged user processes can exploit Fallout to reconstruct privileged information recently written by the kernel. We further show how Fallout can be used to bypass kernel address space randomization. Finally, we identify and explore microcode assists as a hitherto ignored cause of transient execution.
Fallout affects all processor generations we have tested. However, we notice a worrying regression, where the newer Coffee Lake R processors are more vulnerable to Fallout than older generations.


Hehe, ovo nema kraja...
press any key to continue or any other to quit....
 
Odgovor na temu

Zlatni_bg
Beograd

Član broj: 65708
Poruke: 3420
*.dynamic.sbb.rs.



+384 Profil

icon Re: Intel CPU security bug01.06.2019. u 06:37 - pre 17 dana i 19h
Ne znam zasto ali sticem utisak da je neko napravio bazu propusta i stekuje je za dalje intelove postupke. Kako stvari stoje, jedno krpljenje siri drugu rupu, pa onda jos vise naglase stari propust. Ako odrade drugacije, performanse moraju da ispastaju jos vise nego sto je situacija.

Evidentno je da su prsli sa trenutnom arhitekturom, mislim da ako gledamo sigurnost mozemo samo da ocekujemo nesto od 10nm i vidimo sta ce tu da bude. Na computexu su namerno pogasili racunare koji navodno imaju 10nm CPU u sebi kako niko ne bi mogao da radi testove, dok je AMD opet uradio po receptu od protekle 2 godine. Sad kako stvari stoje AMD ima i bolji IPC koji jaca za 15%, clock nece ici na gore jer mislim da je samo die shrink u pitanju (iako se spominju neki veci clockovi - videcemo kad izadju). Memory controller isto poboljsan... ako bude kako kazu a nema razloga da bude drugacije, mislim da ce sramota da ih bude - verovatno i trenutno jeste, dok se drugi hvali, oni mogu samo da krpe rupe :)

Do skoro sam i ja, a verovatno i ostali i razmisljali o 9th gen procesorima, kupovini... sad bas, bas nema razloga kupovati Intel CPU. I ono sto nije server-grade ce verovatno otici onima koji ipak misle da je Intel i dalje bolji po performansama. Jedva cekam da vidim sve benchmarke kad izadje Ryzen 3000.

Sve u svemu... obrnula se situacija. AMD radio u tisini 5 godina, ne izbacivsi skoro nista sto vec nije napravljeno, dok ovi i dalje izbacuju stvari bazirane na skoro Skylake arhitekturi ko manijaci sa po kojim dodatim jezgrom, povecavajuci klokove koje su ljudi i tako dostizali :D
THE ONLY EASY DAY WAS YESTERDAY
 
Odgovor na temu

dejanet
Beograd

Član broj: 19240
Poruke: 893
*.dynamic.sbb.rs.



+680 Profil

icon Re: Intel CPU security bug01.06.2019. u 08:53 - pre 17 dana i 17h
Mislim da Intelova taktika ima smisla, kupuju vreme. Pobediti Intel za kratko vreme, moguce je samo radikalnom promenom arhitekture, dok promena pr. procesa, kao sto vidimo nije dovoljna, AMD gubi momentum.
 
Odgovor na temu

Branimir Maksimovic

Član broj: 64947
Poruke: 2510
109.72.51.*



+551 Profil

icon Re: Intel CPU security bug01.06.2019. u 08:57 - pre 17 dana i 16h
Ranjivost Intelovih procesora u odnosu na AMD, govori potpuno suprotno.
press any key to continue or any other to quit....
 
Odgovor na temu

Zlatni_bg
Beograd

Član broj: 65708
Poruke: 3420
*.gprswap.mts.telekom.rs.



+384 Profil

icon Re: Intel CPU security bug02.06.2019. u 01:31 - pre 17 dana
AMD nije kupovao vreme, prodavali su sta su imali, i koliko toliko se prodavalo. Sa druge strane, Ryzen ne bi dobio toliku popularnost da nisu imali taj bum efekat. Konkurencija niotkuda. Najvise govori promenjena nomenklatura procesora (i5 sa 6c, itd, ubacen i9 van hedt) koje nije bilo dok AMD nije reagovao. Znaci da Intel namerno vec 10 godina zakida i namerno stekuje ono sto moze da proda po vecoj ceni da bi imali kompetentnost, a sa druge strane suplji ko sir.

AMD ne gubi momentum UOPSTE ako uspeju da dobace tih 15% IPC, malcice jace klokove i bude ponude koliko i potraznje. Jos ako uspeju da zavrte memoriju na 3600MHz, to ce da bude i vise od 15% IPC.
THE ONLY EASY DAY WAS YESTERDAY
 
Odgovor na temu

Branimir Maksimovic

Član broj: 64947
Poruke: 2510
109.72.51.*



+551 Profil

icon Re: Intel CPU security bug02.06.2019. u 07:28 - pre 16 dana i 18h
AMD sad ima memoriju na 3200, znaci 3600 nije nemoguce. Da IPC izgleda da je sad veci od Intela.
press any key to continue or any other to quit....
 
Odgovor na temu

Space Beer
ISS

Član broj: 325788
Poruke: 82
*.digitale-gesellschaft.ch.



+51 Profil

icon Re: Intel CPU security bug02.06.2019. u 12:08 - pre 16 dana i 13h
Citat:
Branimir Maksimovic:
I jos jedan...
https://arxiv.org/abs/1905.12701

Hehe, ovo nema kraja...


To je Fallout, već "predstavljen" na prethodnoj strani ;) Ima previše rupa, nema potrebe da se ponavljaju :d

 
Odgovor na temu

Branimir Maksimovic

Član broj: 64947
Poruke: 2510
109.72.51.*



+551 Profil

icon Re: Intel CPU security bug02.06.2019. u 14:45 - pre 16 dana i 11h
Zaveo me datum clanka.
press any key to continue or any other to quit....
 
Odgovor na temu

[es] :: Kernel i OS programiranje :: Intel CPU security bug

Strane: << < .. 5 6 7 8 9 10

[ Pregleda: 87352 | Odgovora: 191 ] > FB > Twit

Postavi temu Odgovori

Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.