Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Load value injection

From Wikipedia, the free encyclopedia
Microprocessor security vulnerability
See also:Transient execution CPU vulnerability
Load value injection
Logo for the Load Value Injection security vulnerability
CVE identifierCVE-2020-0551
Date discoveredMarch 2020; 5 years ago (2020-03)
Affected hardwareIntel x86microprocessors
Websitelviattack.eu

Load value injection (LVI) is an attack onIntel microprocessors that can be used to attackIntel'sSoftware Guard Extensions (SGX) technology.[1] It is a development of the previously knownMeltdown security vulnerability. Unlike Meltdown, which can only read hidden data, LVI can inject data values, and is resistant to the countermeasures so far used to mitigate the Meltdown vulnerability.[2][3]

In theory, any processor affected by Meltdown may be vulnerable to LVI,[4] but as of March 2020[update], LVI is only known to affect Intel microprocessors.[2] Intel has published a guide to mitigating the vulnerability by using compiler technology, requiring existing software to be recompiled to addLFENCEmemory barrierinstructions at every potentially vulnerable point in the code.[5] However, this mitigation appears likely to result in substantial performance reductions in the recompiled code.[6]

See also

[edit]

References

[edit]
  1. ^"Load Value Injection".software.intel.com. 2020-03-10. Retrieved2020-03-11.
  2. ^abCimpanu, Catalin."Intel CPUs vulnerable to new LVI attacks".ZDNet. Retrieved2020-03-11.
  3. ^Alcorn, Paul (10 March 2020)."New Load Value Injection Vulnerability Found In Intel Chips".Tom's Hardware. Retrieved2020-03-11.
  4. ^Claburn, Thomas (10 Mar 2020)."Meltdown The Sequel strikes Intel chips – and full mitigation against data-meddling LVI flaw will slash performance".www.theregister.co.uk. Retrieved2020-03-11.
  5. ^"An Optimized Mitigation Approach for Load Value Injection".software.intel.com. Retrieved2020-03-11.
  6. ^Cutress, Ian."Load Value Injection: A New Intel Attack Bypasses SGX with Significant Performance Mitigation Concerns".www.anandtech.com. Archived fromthe original on March 12, 2020. Retrieved2020-03-11.

External links

[edit]
Variants
Topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Load_value_injection&oldid=1304463008"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp