If You Don’t Run SGX You Can Avoid The Next Intel Mitigations

If You Do Use SGX Then Expect It To Run Slower Soon
It’s time for yet another architectural vulnerability and this time it is Intel’s turn again. The same researchers that ruined your peace of mind with Meltdown and Spectre have discovered another unique attack which Intel’s Software Guard Extensions are vulnerable to. As with the AMD vulnerability revealed earlier in the week, the attack is rather complex to carry out and is unlikely to be seen in the wild so Intel will not be releasing a microcode update. They will however update SGX to protect against this and that mitigation will indeed slow the speed at which the chips will be able to perform.
You can learn more about the Load Value Injection attack, what chips are likely vulnerable and how to deal with it at The Register.
The researchers in their paper make clear the chip maker isn't quite so blasé about the risks where SGX comes into play: "Intel considers LVI particularly severe for SGX…"
More Tech News From Around The Web
- It’s official: E3 2020 has been cancelled @ Ars Technica
- Think your smartwatch is good for warning of a heart attack? Turns out it’s surprisingly easy to fool its AI @ The Register
- Surveillance Company Banjo Used a Secret Company and Fake Apps To Scrape Social Media @ Slashdot
- Xilinx’s high-end Versal FPGA is like a designer handbag. If you need to ask the price, you probably can’t afford it @ The Register
- Gryphon Tower Mesh WiFi System @ TechPowerUp
- Smart Speakers “Accidentally” Listen Up To 19 Times A Day @ Hackaday
- Vertagear SL5000SE Gaming Chair @ Kitguru