Tuesday, April 13, 2021

AMD admits that Zen 3 CPUs are vulnerable to a new Spectre-style attack

In brief: AMD has confirmed that a microarchitecture optimization inside Zen 3 CPUs can be exploited in a similar fashion to the Spectre vulnerabilities that plagued Intel CPUs a few generations ago. Disabling the optimization is possible, but will carry a performance penalty that AMD doesn’t believe is worth it for all but the most critical deployments of the processors.

In a recently published whitepaper, titled “Security Analysis of AMD Predictive Store Forwarding,” AMD describes the nature of the vulnerability and discusses the associated complications. In simple terms, the implementation of Predictive Store Forwarding (PSF) reopens the lines of attack previously threatened by Spectre v1, v2, and v4, because of its speculative nature.

AMD describes PSF as a hardware optimization “designed to improve the performance of code execution by predicting dependencies between loads and stores.” Like branch prediction, a feature that enabled some previous Spectre attacks, PSF makes predictions to allow the processor to execute subsequent instructions faster. PSF creates a vulnerability when it makes an incorrect prediction.

Incorrect predictions can be the result of two scenarios, says AMD. “First, it is possible that the store/load pair had a dependency for a while but later stops having a dependency.” This happens naturally as stores and loads change during a program’s execution. The second scenario occurs “if there is an alias in the PSF predictor structure,” and the alias is used when it shouldn’t have been. Both scenarios can be triggered by malicious code as desired, at least theoretically.

AMD writes, “because PSF speculation is limited to the current program context, the impact of bad PSF speculation is similar to that of speculative store bypass (Spectre v4).”

Like Spectre v4, the vulnerability occurs when one of the processor’s security measures is bypassed by the incorrect speculation. In combination with other attacks; AMD uses Spectre v1 as an example, the incorrect prediction can result in data leakage. “This is similar to the security risk of other Spectre-type attacks,” says AMD.

Programs that depend on software sandboxing for security are the most vulnerable to PSF attacks. Programs that use hardware isolation “may be considered safe” from PSF attacks because PSF speculation doesn’t occur across address spaces. It also doesn’t occur across privilege domains.

AMD has found that techniques like address space isolation are sufficient to stop PSF attacks, however, they’ve provided the means to disable PSF, even on a per-thread basis, if desired. But because the security risk is “low,” and because “AMD is not currently aware of any code that would be considered vulnerable due to PSF behavior,” they universally recommend leaving the PSF feature enabled as the default setting, even when protections aren’t available.

Source link

MORE Articles

Samsung Announces a Galaxy Unpacked Event on April 28 | Digital Trends

Samsung has announced its next Galaxy Unpacked event, where it will likely show off what’s next in its Galaxy product lines. This event...

Nvidia expects crippling GPU shortages to continue throughout 2021

If you’re waiting for the crippling graphics card shortage to loosen up before buying new hardware, well, you might be waiting for a...

Microsoft’s Surface Laptop 4 packs much faster Intel processors

Microsoft has unveiled the Surface Laptop 4.You’ll get faster 11th-gen Intel Core chips, but a familiar design and older AMD options.It’s available April...

Anker is making a $130 webcam as part of its new expansion to home office gear

Anker has announced a new webcam as part of its new AnkerWork line of home office gear. The new webcam, called...

शादीशुदा पुरुषों के लिए बड़े काम की चीज है मुनक्का, जानें इस्तेमाल का तरीका

नई दिल्ली: मुनक्का को आयुर्वेद में औषधीय गुणों का भंडार कहा गया है. ऐसा माना जाता है कि मुनक्का किशमिश की तुलना में...

Stay Connected