9/22/2023 0 Comments Amd link![]() However, it can only do this within a certain range of framerates and refresh rates. The only real way to get around this is to sync the refresh rate to the framerate (also called variable refresh rate or VRR), and this is exactly what FreeSync does, just like Nvidia's competing G-Sync. The end result is that the top half of the screen has half of the latest frame, and the bottom half has the previous frame. 3.33 milliseconds later, the display is finally ready to show a new image, but it's caught the game in the middle of making a new frame. The game is the first to get a new image completed, but the monitor still has 3.33 milliseconds to go, so the game starts making the next frame. If your monitor refreshes its display or shows you a new image every 10 milliseconds while your game is pumping out a new frame every 6.67 milliseconds, that's obviously a completely different amount of time for each. ![]() What's really happening is that your monitor is showing you two incomplete frames at once. To the naked eye, it's a really ugly cut across your display that makes it look like it's cut in half, but there's a little more to it than that. "While this certainly increases the known attack surface, it remains to be seen whether practical exploitation is possible on Intel CPUs," he said.Screen tearing is what happens with the refresh rate of your monitor isn't exactly the same as the framerate of the game you're playing, the movie you're watching, or any other sort of animated content. Their analysis found that Intel CPUs are vulnerable to the prediction manipulation tactic. Razavi said his team is currently evaluating if other CPU vendors are vulnerable to the same flaw. On discovering the vulnerability, the researchers said, they alerted AMD, which disabled prediction return in the kernel. Kaveh Razavi, the lead research supervisor, said the attack is particularly dangerous for cloud computing platforms on which several customers share the same hardware.Īlthough the vulnerability has not been exploited previously, Razavi said hackers can potentially adopt the tactics to conduct monthslong stealth operations, since exploitation at kernel level is harder to detect and mitigate. This further allowed the researchers to leak data from "anywhere in the computer’s memory," including the kernel. Researchers were able to inject new predictions, tricking the processor into believing the predictions were instructions it had seen before, which allowed the researchers to bypass security checks that earlier ensured only trustworthy predictions would be processed. Computer processors use branch prediction to speed up calls to memory, which are relatively slow. To exploit the flaw, the researchers chained an older AMD vulnerability called Phantom Speculation that causes AMD processors to make a wrong branch predictor - that is, to force the computer to make an incorrect guess about the next instruction to execute. "Our results show that we are able to successfully leak the root password hash in all 10 runs, in a median of 11 minutes and 38 seconds," the report says. ![]() When exploited, the flaw allows attackers to inject code that will make the targeted devices misinterpret data, causing data leaks from the processor, a new paper from security researchers at Swiss university ETH Zürich finds. The researchers named the flaw after the 2010 movie of the same name, since both the hacking technique and the film's plot involve planting false ideas into memory. The flaw, tracked as CVE-2023-20569, and dubbed "Inception," affects all versions of AMD Zen computer processing unit. See Also: Live Webinar | Unmasking Pegasus: Understand the Threat & Strengthen Your Digital Defense Security researchers uncovered a vulnerability in Advanced Micro Devices chips that could allow hackers to trick a computer system into leaking data from its kernel. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |