Kensan on Nostr: New CPU vulnerability but this time it's Apple: GoFetch - Breaking Constant-Time ...
New CPU vulnerability but this time it's Apple: GoFetch -
Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers
GoFetch is a microarchitectural side-channel attack that can extract secret keys from constant-time cryptographic implementations via data memory-dependent prefetchers (DMPs).
Website:
https://gofetch.fail/Direct link to paper:
https://gofetch.fail/files/gofetch.pdfPublished at
2024-03-21 14:58:24Event JSON
{
"id": "35716c5fd1ee181cb99439f6e6c13e448f7d25d4b2e3e8b25e69e96a316e4710",
"pubkey": "685060d70fa3c377e70bba8f1cdafdd9a7fbbc1489b2eaf2c615eab2a57cb7c3",
"created_at": 1711033104,
"kind": 1,
"tags": [
[
"proxy",
"https://mastodon.social/users/Kensan/statuses/112134265542697262",
"activitypub"
]
],
"content": "New CPU vulnerability but this time it's Apple: GoFetch - \nBreaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers\n\nGoFetch is a microarchitectural side-channel attack that can extract secret keys from constant-time cryptographic implementations via data memory-dependent prefetchers (DMPs).\n\nWebsite:\nhttps://gofetch.fail/\n\nDirect link to paper:\nhttps://gofetch.fail/files/gofetch.pdf",
"sig": "cc537a161856563a9dacec8773e52b207fbaab6fb1f0efa2c2fe7d5ed04ef5b8e5f3ca25e0092ba96c605af27ea2a49a1629d8038f511275b3a5b8fd21c9b429"
}