In the "Gates not his cocky self at RSA conference" Roger Smith article,
the author says: 
  [Adi Shamir] cautioned that many of the current generation of 
  Intel processors that use multi-threading and multi-core 
  technology seem to be vulnerable to timing attacks that can 
  use unprivileged threads to find keys stored in their caches.

I hadn't known that one process could read the memory of a second
process running on a different hyper-thread or a different core through
a cleverly timed cache hits (which is what I think this sentence says).
Does anyone have further information on this or mitigation strategies?

-Michael Heyman

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to