IOLeak - CPU Side Channel Attacks
AMD ID: AMD-SB-7042
Potential Impact: N/A
Severity: N/A
Summary
Researchers have provided AMD with a summary of relevant remarks and findings detailed in a paper titled “IOLeak Side-Channel Attack Exploiting CPU Frequency Scaling and I/O Latency.”
AMD reviewed the summary and believes this attack is similar to previously disclosed side-channel attacks such as “Hertzbleed” and that existing mitigation recommendations for such attacks remain applicable to mitigate the techniques described in the researchers’ summary.
AMD recommends that developers apply countermeasures such as masking1,2,3, hiding3 or key-rotation.
- "Synthesis of Masking Countermeasures against Side Channel Attacks" by Hassan Eldib and Chao Wang
- "Masking against Side-Channel Attacks: a Formal Security Proof" by Emmanuel Prouff and Matthieu Rivain
- "Power Analysis Attacks: Revealing the Secrets of Smart Cards", by Elisabeth Oswald, Stefan Mangard, and Thomas Popp
Acknowledgement
AMD thanks Li Zhu and Chundong Wang for submitting the report and engaging in coordinated vulnerability disclosure.
Revisions
Revision Date |
Description |
2025-05-22 | Initial publication |