TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Hot Pixel' Attack Steals Data from Apple, Intel, Nvidia, and AMD Chips

80 点作者 uguuo_o将近 2 年前

6 条评论

slashdev将近 2 年前
&gt; By forcing one of the three variables of DVFS (heat, power, or frequency) to become a constant, the researchers can then monitor the other two variables to distinguish which instructions are being executed, even with enough precision to ascertain the different operands of the same instruction.<p>Sounds like one of those attacks that works in theory but is too impractical to use in real life. This is harder than cache side channel attacks, and we still haven’t seen much use of those in the wild, years later.<p>&gt; Ultimately, this furthers other attacks, like website fingerprinting.<p>Umm no. Did ChatGPT write that? Fingerprinting isn’t an attack and that’s not how it works. Also this requires access to system temperatures and other metrics that are absolutely not available from JavaScript.
评论 #36095443 未加载
评论 #36095348 未加载
评论 #36095537 未加载
评论 #36095522 未加载
alain94040将近 2 年前
I found the paper didn&#x27;t live up to its claims. It said: <i>the ever-changing behavior of these SoCs is also visible via internal measurement sensors, allowing us to distinguish between executed instructions, and even different operands of the same instruction</i><p>But when you read further and see what they tried:<p><i>We then selected one Arm instruction from each data-processing bucket,testingstores(str),AESinstructions(aese, aesmc), rotate right (ror), bitwise and (and), and both integer and floating-point addition (add, fadd) and multiplication (mul, fmul). We run each instruction in a loop on all available P-cores on each test device</i><p>What they did is define a handful of known workloads, with very different power profiles. And then they find that they can tell them apart by looking at the power of the chip. Well, duh.
jmclnx将近 2 年前
&gt;The attack requires data from the PC&#x27;s internal power, temp, and frequency sensors, but this information can be accessed from user accounts that don&#x27;t have administrator access<p>Looks like only a local user can do this, but the article is not to clear on that.<p>Anyway this seems very hard to do. Also I wonder if using OpenBSD&#x27;s port obsdfreqd can prevent this. Based upon usage, it will adjust the frequency and CPU Temp on the fly.<p><a href="https:&#x2F;&#x2F;tildegit.org&#x2F;solene&#x2F;obsdfreqd" rel="nofollow">https:&#x2F;&#x2F;tildegit.org&#x2F;solene&#x2F;obsdfreqd</a><p>edit: grammer
ngneer将近 2 年前
This highlights subtly different thinking processes in the security industry. Real world adversaries think &quot;this is an interesting asset, how can we get to it, with our available primitives?&quot; whereas academic researchers think &quot;this is an interesting primitive, what kind of assets would make the paper work?&quot;.
wisienkas将近 2 年前
The article mentions 0.1 bit per second, but cpu&#x27;s are handling mb&#x27;s in seconds, so is this actually sufficient, even at 1 bit per second, to gain any useful insight from the system?
vrtnis将近 2 年前
Table 19 from the paper seems to show pixel extraction accuracy is highest for AMD Radeon (94%) but lower for M1&#x2F;M2 (~60%). Can&#x27;t seem to find an explanation for this variation though. Thoughts?