<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: New ‘Hertzbleed’ Remote Side-Channel Attack</title>
	<atom:link href="http://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 26 Apr 2026 13:34:04 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772656</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 Jun 2022 11:54:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772656</guid>
		<description><![CDATA[https://hackaday.com/2022/06/17/this-week-in-security-pacman-hetzbleed-and-the-death-of-internet-explorer/

There is a quirk in SIKE, also discovered and disclosed in this research, that it’s possible to short-circuit part of the algorithm, such that a series of internal, intermediary steps result in a value of zero. If you know multiple consecutive bits of the static key, it’s possible to construct a challenge that hits this quirk. By extension, you can take a guess at the next unknown bit, and it will only fall into the quirk if you guessed correctly. SIKE uses constant-time programming, so this odd behavior shouldn’t matter. And here the Hertzbleed observation factors in. The SIKE algorithm consumes less power when doing a run containing this cascading-zero behavior. Consuming less power means that the processor can stay at full boost clocks for longer, which means that the key exchange completes slightly more quickly. Enough so, that it can be detected even over a network connection. They tested against Cloudflare’s CIRCL library, and Microsoft’s PQCrypto-SIDH, and were able to recover secret keys from both implementations, in 36 and 89 hours respectively.

There is a mitigation against this particular flaw, where it’s possible to detect a challenge value that could trigger the cascading zeros, and block that value before any processing happens. It will be interesting to see if quirks in other algorithms can be discovered and weaponized using this same technique. Unfortunately, on the processor side, the only real mitigation is to disable boost clocks altogether, which has a significant negative effect on processor performance.]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2022/06/17/this-week-in-security-pacman-hetzbleed-and-the-death-of-internet-explorer/" rel="nofollow">https://hackaday.com/2022/06/17/this-week-in-security-pacman-hetzbleed-and-the-death-of-internet-explorer/</a></p>
<p>There is a quirk in SIKE, also discovered and disclosed in this research, that it’s possible to short-circuit part of the algorithm, such that a series of internal, intermediary steps result in a value of zero. If you know multiple consecutive bits of the static key, it’s possible to construct a challenge that hits this quirk. By extension, you can take a guess at the next unknown bit, and it will only fall into the quirk if you guessed correctly. SIKE uses constant-time programming, so this odd behavior shouldn’t matter. And here the Hertzbleed observation factors in. The SIKE algorithm consumes less power when doing a run containing this cascading-zero behavior. Consuming less power means that the processor can stay at full boost clocks for longer, which means that the key exchange completes slightly more quickly. Enough so, that it can be detected even over a network connection. They tested against Cloudflare’s CIRCL library, and Microsoft’s PQCrypto-SIDH, and were able to recover secret keys from both implementations, in 36 and 89 hours respectively.</p>
<p>There is a mitigation against this particular flaw, where it’s possible to detect a challenge value that could trigger the cascading zeros, and block that value before any processing happens. It will be interesting to see if quirks in other algorithms can be discovered and weaponized using this same technique. Unfortunately, on the processor side, the only real mitigation is to disable boost clocks altogether, which has a significant negative effect on processor performance.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772655</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 Jun 2022 11:51:59 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772655</guid>
		<description><![CDATA[https://hackaday.com/2022/06/17/this-week-in-security-pacman-hetzbleed-and-the-death-of-internet-explorer/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2022/06/17/this-week-in-security-pacman-hetzbleed-and-the-death-of-internet-explorer/" rel="nofollow">https://hackaday.com/2022/06/17/this-week-in-security-pacman-hetzbleed-and-the-death-of-internet-explorer/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772527</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 19 Jun 2022 14:13:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772527</guid>
		<description><![CDATA[New Hertzbleed side-channel attack affects Intel, AMD CPUs
https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/]]></description>
		<content:encoded><![CDATA[<p>New Hertzbleed side-channel attack affects Intel, AMD CPUs<br />
<a href="https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/" rel="nofollow">https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772526</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 19 Jun 2022 14:12:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772526</guid>
		<description><![CDATA[Hertzbleed Winkles Secret Keys out of Modern CPUs, But Microcode Fixes Aren&#039;t on the Roadmap
Building on the concepts of Heartbleed and Spectre, Hertzbleed is a functional attack against remote servers running on popular processors.
https://www.hackster.io/news/hertzbleed-winkles-secret-keys-out-of-modern-cpus-but-microcode-fixes-aren-t-on-the-roadmap-4698080215a7]]></description>
		<content:encoded><![CDATA[<p>Hertzbleed Winkles Secret Keys out of Modern CPUs, But Microcode Fixes Aren&#8217;t on the Roadmap<br />
Building on the concepts of Heartbleed and Spectre, Hertzbleed is a functional attack against remote servers running on popular processors.<br />
<a href="https://www.hackster.io/news/hertzbleed-winkles-secret-keys-out-of-modern-cpus-but-microcode-fixes-aren-t-on-the-roadmap-4698080215a7" rel="nofollow">https://www.hackster.io/news/hertzbleed-winkles-secret-keys-out-of-modern-cpus-but-microcode-fixes-aren-t-on-the-roadmap-4698080215a7</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772332</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Jun 2022 22:03:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772332</guid>
		<description><![CDATA[https://cryptoslate.com/hackers-can-steal-crypto-keys-on-intel-amd-cpus-via-hertzbleed-vulnerability/

Intel and AMD react
According to available information, the chip giants have no plans to deploy a  firmware patch.

The report advises users to disable the frequency boost feature. On Intel, it is known as “Turbo boost” and “Precision boost” on AMD. However, that could affect their system’s performance.

Intel also revealed that it had shared the result of its investigations with other chip makers for similar assessments of their systems. It continued that the hours required to steal the cryptographic keys might be challenging to achieve except in a lab setting.

https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/frequency-throttling-side-channel-guidance.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://cryptoslate.com/hackers-can-steal-crypto-keys-on-intel-amd-cpus-via-hertzbleed-vulnerability/" rel="nofollow">https://cryptoslate.com/hackers-can-steal-crypto-keys-on-intel-amd-cpus-via-hertzbleed-vulnerability/</a></p>
<p>Intel and AMD react<br />
According to available information, the chip giants have no plans to deploy a  firmware patch.</p>
<p>The report advises users to disable the frequency boost feature. On Intel, it is known as “Turbo boost” and “Precision boost” on AMD. However, that could affect their system’s performance.</p>
<p>Intel also revealed that it had shared the result of its investigations with other chip makers for similar assessments of their systems. It continued that the hours required to steal the cryptographic keys might be challenging to achieve except in a lab setting.</p>
<p><a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/frequency-throttling-side-channel-guidance.html" rel="nofollow">https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/frequency-throttling-side-channel-guidance.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772331</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Jun 2022 22:01:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772331</guid>
		<description><![CDATA[Hackers can steal crypto keys on Intel, AMD CPUs via ‘Hertzbleed’ vulnerability
The researchers noted that the result of the research could be applied to all modern CPUs as the majority possess the Dynamic Voltage Frequency Scaling (DVFS).
https://cryptoslate.com/hackers-can-steal-crypto-keys-on-intel-amd-cpus-via-hertzbleed-vulnerability/]]></description>
		<content:encoded><![CDATA[<p>Hackers can steal crypto keys on Intel, AMD CPUs via ‘Hertzbleed’ vulnerability<br />
The researchers noted that the result of the research could be applied to all modern CPUs as the majority possess the Dynamic Voltage Frequency Scaling (DVFS).<br />
<a href="https://cryptoslate.com/hackers-can-steal-crypto-keys-on-intel-amd-cpus-via-hertzbleed-vulnerability/" rel="nofollow">https://cryptoslate.com/hackers-can-steal-crypto-keys-on-intel-amd-cpus-via-hertzbleed-vulnerability/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772269</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Jun 2022 16:46:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772269</guid>
		<description><![CDATA[https://www.tomshardware.com/news/intel-amd-hertzbleed-cpu-vulnerability-boost-clock-speed-steal-crypto-keys]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tomshardware.com/news/intel-amd-hertzbleed-cpu-vulnerability-boost-clock-speed-steal-crypto-keys" rel="nofollow">https://www.tomshardware.com/news/intel-amd-hertzbleed-cpu-vulnerability-boost-clock-speed-steal-crypto-keys</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772226</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Jun 2022 07:18:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772226</guid>
		<description><![CDATA[New Hertzbleed side-channel attack affects Intel, AMD CPUs https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/
A new side-channel attack known as Hertzbleed allows remote attackers to steal full cryptographic keys by observing variations in CPU frequency enabled by dynamic voltage and frequency scaling (DVFS).]]></description>
		<content:encoded><![CDATA[<p>New Hertzbleed side-channel attack affects Intel, AMD CPUs <a href="https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/" rel="nofollow">https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/</a><br />
A new side-channel attack known as Hertzbleed allows remote attackers to steal full cryptographic keys by observing variations in CPU frequency enabled by dynamic voltage and frequency scaling (DVFS).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/15/new-hertzbleed-remote-side-channel-attack/comment-page-1/#comment-1772214</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 15 Jun 2022 21:28:32 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191584#comment-1772214</guid>
		<description><![CDATA[Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure. All intel cpus and several of AMD  desktop, mobile and server processors are affected. https://www.hertzbleed.com]]></description>
		<content:encoded><![CDATA[<p>Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure. All intel cpus and several of AMD  desktop, mobile and server processors are affected. <a href="https://www.hertzbleed.com" rel="nofollow">https://www.hertzbleed.com</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
