Intel-Funded Study Finds AMD Processors Including All Ryzen Chips Vulnerable To Side-Channel Security Flaw

AMD Ryzen
UPDATE 3/9/20 - 2:17 PM ET:
Based on some of the comments, we felt it would be important to provide an update clarifying that Intel also funds chip security research on a broad scale, including on its own processors. Gruss and his team did the right thing being transparent about the funding. At the same time, it sounds like just one of the students involved in the research received funding from Intel. It's still interesting, as we pointed out above, but we also don't feel like Intel sent out the security hounds to drag its competitor (AMD) through the mud, or anything like that. To that end, Gruss is also one of the researchers who discovered the Meltdown and ZombieLoad vulnerabilities. Mortiz Lipp, another of the paper's co-authors, was one of two teams that independently discovered and reported Spectre.

Original Article:
Academic researchers at Graz University of Technology in Austria have published a paper detailing what they say are security flaws inherent in every AMD processor manufactured from 2011 to 2019, which would include the company's entire Zen lineup. The paper states "additional funding was provided by generous gifts from Intel," so let's start there.

The disclosure appears in the Acknowledgement section of the paper, and after that whole CTS Labs controversy two years ago, it's understandable why some people might be suspicious. Daniel Gruss, an assistant professor in the Secure Systems group at the University who co-authored the paper, offered up some clarification on the matter on Twitter.

"You will find this in almost all of my papers, finding flaws in various processors and other things. Intel funds some of my students. If one of these students co-authors a paper, we acknowledge the gift of course," Gruss wrote.

He also noted half-jokingly that he could have "just dropped that PhD student off the paper instead," further noting that his "funding sources do not restrict my academic freedom and independence," otherwise he "couldn't accept that funding."

Intel's funding is interesting, and at the same time, not sufficient reason alone to dismiss the findings, especially if things are as Gruss explains. AMD has yet to issue a comment, so we'll be keeping an eye on the situation.

Researchers Claim AMD Processors Dating Back To Bulldozer Susceptible To Side-Channel Attacks

Ryzen 9

Funding disclosure aside, the researchers say AMD's CPU architectures, both past (dating back to Bulldozer) and present are vulnerable to side-channel attacks. These kinds of attacks have received a lot of attention since Spectre and Meltdown came to light, and have mostly affected Intel's processors. It's not clear if Intel's CPU designs are simply more susceptible to side-channel exploits, or if more attention has been paid to Intel's architectures, given the disparity in market share.

If it is the latter, then we could end up seeing more papers like this one that focus on AMD's hardware designs. AMD has been making strides in every segment, from mainstream consumer CPUs to data center and supercomputing markets. We're jumping ahead of ourselves, though. As it pertains here, the paper highlights a pair of attack techniques dubbed Collide+Probe and Load+Reload.

"We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+ Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last level-cache evictions," the paper states.

As outlined, these attacks do not require physical access to a machine or other mitigating circumstances that would render them mostly benign. The researchers say they tested one of their proof-of-concept techniques in both Chrome and Firefox.

What's basically at play here, according to the paper, is a manipulation of the L1D cache predictor to siphon data that is supposed to be off limits and secure. One of the benefits of the "way predictor" in L1 data cache is a reduction in power consumption. But it may come at a security cost.

"In the first attack technique, Collide+Probe, we exploit μTag collisions of virtual addresses to monitor the memory accesses of a victim time-sharing the same logical core. In the second attack technique, Load+Reload, we exploit the property that a physical memory location can only reside once in the L1D cache. Thus, accessing the same location with a different virtual address evicts the location from the L1D cache. This allows an attacker to monitor memory accesses on a victim, even if the victim runs on a sibling logical core," the paper states.

Daniel Gruss Tweet

The researcher paper (PDF) goes into a lot more detail for anyone who cares to parse the data for themselves. In addition, Gruss answered a question on Twitter about the comparative severity of these techniques in relation to Meltdown and ZombieLoad, saying they are "certainly not" in the same league, as those exploits "leak tons of actual data."

It also sounds like the side-channel exploits outlined in the paper can be mitigated via software, though the paper also recommends hardware changes would go a long way, and specifically "designing the processor in a way that allows temporarily disabling the way predictor temporarily."

We will have to wait and see how AMD responds, and if there are patches to come, how they might impact performance. It will also be interesting to see if more types of these disclosures manifest now that AMD is back into the thick of things, so to speak.

Show comments blog comments powered by Disqus