SMoTherSpectre: exploiting speculative execution through port contention

  • 7023746
  • 25-Feb-2019
  • 13-May-2019


SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 15


Researchers have identified a new side channel attack against CPUs, that allows local attackers able to execute code to gain information about other processes running on the same core.

Intel CPUs use various "ports" to delegate subtasks of computing. CPU Threads running on the same CPU core share the use of those ports, and while one is used it cannot be used by the other CPU thread.

This information can then be used to determine the operation running on the other CPU thread, for instance to detect cryptographic operations and get knowledge of cryptographic materials. 


The recommendation for software mitigation is to implement and improve cryptographic and other secret data operations so that they do not expose different CPU port contention based on their input, by using constant time operations.

Most of the cryptographic libraries are already implemented in a way that they do not expose this kind of information. 

There will be ongoing work to cover more cases as they are identified.


External research paper :

Feedback service temporarily unavailable. For content questions or problems, please contact Support.