Paul Fenwick Profile picture
Jan 4, 2018 10 tweets 3 min read Twitter logo Read on Twitter
Some of you might be hearing about #Spectre and #Meltdown today, which allow memory from other processes and the kernel itself to be read. They exploit CPU designs.

I'm still doing my reading, but a good place to start if you're technically inclined is spectreattack.com
Spectre involves training the CPU to speculatively run invalid code in the victim's address space, and then using a side-channel (such as cache timings) to infer details about the victim's memory.

It affects at least AMD, Intel and ARM CPUs

The sample exploit reads 10KB/s.
Spectre also includes sample code for breaking out of the JavaScript sandbox on chrome.

It's very, very clever.
#Meltdown works by exploiting the fact that CPUs will execute instructions ahead of the "current" instruction as means of optimisation.

It's possible to observe the side-effects of instructions that were executed but never committed.
Meltdown reads from kernel memory (an illegal op), then uses that read times the page size to make a second memory access.

By observing cache hits and misses, you can infer the memory that was read by the invalid-and-discarded operation.

Which means you can read kernel memory.
By use of some clever optimisations, #Meltdown kernel dumping at a speed of 122KB/s is possible.

On modern (Broadwell+) Intel CPUs, a speed of 502KB/s is achieved.
In addition, because kernel memory usually maps the physical address space, #Meltdown can read most (on unpatched Windows) or all (on unpatched Linux) physical memory.

So it can and does break containers, virtual machines, and everything else we rely upon.
The good news is that #Meltdown can be defended against with a series of kernel patches. On Linux these are known as KPTI (formerly KAISER).

These exist in Linux 4.15, 4.14.11, Windows 10 Build 17035, and OSX 10.13.2.

Upgrade your systems if you haven't already done so.
Both of these vulnerabilities are scary.

Meltdown because lots of devices won't get patched.

Spectre because patching at all seems to be extremely challenging to patch at all. It's named because it will "haunt us for some time".
We're seeing a lot more vulnerabilities exploiting flaws & artefacts of hardware.

Rowhammer changes memory by using voltage fluctuations to flip bits.

I've seen ssh sessions run over cache invalidation channels between VMs.

I don't think spectre and meltdown will be the last.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Paul Fenwick

Paul Fenwick Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @pjf

Mar 20, 2018
The app used to harvest facebook data for Cambridge Analytica also harvested it from the *friends* of users that authorised it.

I was talking about how dangerous this was back in 2010. It's super common, almost nobody turns off the controls which allow it.
If you're a Facebook user, then going to "Settings -> Apps -> Apps Others Use" will let you disable what information your friends' applications can harvest about you.

Because of course one of the most important privacy settings is hidden under "apps" rather than "privacy".
Unless you have reason not to, I'd recommend going to Facebook "Settings -> Apps -> Apps, Websites and Plugins", and turn the entire platform off.

This will stop 3rd party apps and websites from seeing almost anything about you, also breaking 3rd party logins and games.
Read 12 tweets
Nov 26, 2017
Lots of people have been telling me it's great that Australia voted yes to marriage equality in the recent referendum.

I have to explain that it wasn't a referendum, is not legally binding, and was an expensive attempt to get a different result than what the public wants. 1/
Even if we ignore the fact that it's abhorrent to be asking the majority whether a minority should have basic human rights, the government has known for years that there's strong majority support for marriage equality.

Because sampling and statistics are a thing. 2/
Australia has mandatory voting laws. We have amazing voter turn-out, well resourced polling places, and a culture that celebrates democracy with a sausage sizzle. #democracysausage

A referendum would have forced marriage equality, so we didn't get that. 3/
Read 10 tweets
Nov 1, 2017
1/This terrifies me. The researchers go on to make a 3D printed turtle that the machine classifies as a "rifle", regardless of viewing angle
2/ Machine classification of images is a *huge* growth area, and is already seeing extensive use. You'll see even more with autonomous cars.
3/ If you have access to the classifier, you can make 'adversarial' objects that look plain to humans, but radically different to machines.
Read 16 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(