公司
解决方案
开发者
工作机会
CN
CN
EnglishChinese
Ampere Computing Logo
Ampere Computing Logo
解决方案
解决方案主页
平台系统
解决方案
性能总览
Reference Architecture Overview
Tuning Guides Overview
工作负载简介概览
如何购买
Ampere 系统
Ampere Altra
Azure
Equinix
甲骨文
腾讯云
谷歌云
Ampere AI 下载工作原理常见问题
开发者
开发者中心部署云应用使能开源社区把数据用起来构建云应用设计云应用
支持
Hero Image

Hertzbleed

Bulletin ID: AMP-SB-0005

Potential Impact: This attack can potentially use a power side-channel to compromise the confidentiality of data used in a victim task.

Severity: CVSS score: 6.3 (Medium)

Summary

Hertzbleed is a power side-channel attack that indirectly correlates the frequency scaling of the processor with the current series of instructions and data being processed on the system. Changes in the processor frequency during execution of the victim task can be observed through the execution time of the victim, allowing inference of power consumption through observation of wall time. This attack can potentially compromise the confidentiality of data used in a victim task.

Fixed in

There does not exist a complete mitigation against these types of attacks. However, there are several countermeasures and recommendations for cryptographic code, to protect against power side-channels, that can be used to mitigate Hertzbleed (see the references below) .

E. Prouff, and M. Rivain "Masking against Side-Channel Attacks: a Formal Security Proof," Advances in Cryptology, EUROCRYPT 2013

E. Oswald, S. Mangard, and T. Popp "Power Analysis Attacks: Revealing the Secrets of Smart Cards," Power Analysis Attacks, Springer 2007

Affected Products

Ampere® Altra®, Ampere® Altra® Max, AmpereOne

Recommendations

There does not exist a complete mitigation against these types of attacks. However, there are several countermeasures and recommendations for cryptographic code, to protect against power side-channels, that can be used to mitigate Hertzbleed (see the references below). It is highly recommended to use strong cryptographic code to mitigate against such issues.

E. Prouff, and M. Rivain "Masking against Side-Channel Attacks: a Formal Security Proof," Advances in Cryptology, EUROCRYPT 2013

E. Oswald, S. Mangard, and T. Popp "Power Analysis Attacks: Revealing the Secrets of Smart Cards," Power Analysis Attacks, Springer 2007

Created At : December 26th 2022, 7:06:05 am
Last Updated At : December 28th 2022, 10:19:08 am

Ampere Computing

4655 Great America Parkway

Suite 601 Santa Clara, CA 95054

Tel: +86-021-64338766

info[at]amperecomputing.com

关于我们
image
image
© 2022 Ampere Computing LLC. All rights reserved. Ampere, Altra and the A and Ampere logos are registered trademarks or trademarks of Ampere Computing.