Cyber Security Specialistsregularly find regular problems and vulnerabilities in processors, while concentrating on Intel, whose chips have been threatened by Specter and Meldown attacks for a long time. However, AMD's seemingly flawless chips have similar security concerns. Experts from the Technical University of Graz (Austria) concluded that AMD chips using the Zen or Zen 2 architecture are vulnerable.
Together with representatives of Google engineersGraz University at one time identified a threat to Specter and Meldown for Intel. The security problems identified by AMD processors now have a similar technical implementation and will affect chips manufactured from 2011 to 2019. During the testing, two types of attacks were carried out: Collide + Probe and Load + Reload. As a result, experts came to the conclusion that the vulnerability is inherent in the prediction mechanism serving the cache memory of the first level.
According to researchers, hackers will be able touse the Collide + Probe attack to gain access to the device’s memory, without using information about the victim’s physical address. Using the Load + Reload methodology, hackers will be able to obtain high-precision traces of access to the device’s memory on the same physical core. The Load + Reload method uses shared memory, which creates the conditions for carrying out covert attacks.
Experts used to test vulnerabilitiesJavaScrip running in Chrome and Firefox. As a result, access to AES encryption keys was obtained. Also, according to experts, the vulnerability allows you to penetrate the cloud structures of data centers.
At AMD, which back in August 2019received expert recommendations on the identified vulnerability, stated that they were aware of the problem, but did not consider it a new type of threat. Since the time that AMD has detected a problem and notified, updates that eliminate threats have not yet been released.