wireguard.lists.zx2c4.com archive mirror
 help / color / mirror / Atom feed
* NetSpectre / AVX2 timing side-channel attack
@ 2018-07-27 10:29 Baptiste Jonglez
  0 siblings, 0 replies; only message in thread
From: Baptiste Jonglez @ 2018-07-27 10:29 UTC (permalink / raw)
  To: wireguard

[-- Attachment #1: Type: text/plain, Size: 571 bytes --]

Hi,

Here is an interesting side-channel attack that uses AVX2 timing to
potentially extract private key material (read section 4.2):

  https://news.ycombinator.com/item?id=17621823
  https://misc0110.net/web/files/netspectre.pdf

It is based on a power-saving feature: after being idle for 1 ms,
the AVX2 unit in Intel processors is powered off, which greatly increases
latency for the next AVX2 instruction.

Of course, to be exploited, the code would need to perform AVX2
instructions conditionnally.  I'd be curious to know if it is the case in
Wireguard.

Baptiste

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2018-07-27 10:20 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-07-27 10:29 NetSpectre / AVX2 timing side-channel attack Baptiste Jonglez

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).