Log In
Forgot your password?
Create an Account
Loading
Alexander Bourque

View Alexander's Profile
View Alexander's PC
United States
December 27, 1995
Student at Northern Virginia Community College
Playing Whatever is in my Steam Library.
183 Friends
183 Friends
Favorite Sponsor:

Alexander Bourque

Alexander's Feed
Alexander Bourque
 

"Researchers uncover Spectre-like #Intel CPU vulnerability called #BranchScope"
Researchers from four US universities, College of William & Mary, University of California Riverside, Carnegie Mellon University in Qatar, and Binghamton University, have released a paper which details a new #Spectre like vulnerability that they are calling BranchScope, a new side-channel attack which targets the "directional branch predictor."

They have apparently tested it on Sandy Bridge, Haswell and Skylake processors,… See More

with the attack being launchable without any administrator rights with an error rate of less than 1%.

The researchers are claiming that none of the mitigation put in place for Spectre and #Meltdown will help against BranchScope while Intel obviously claims otherwise.

Source: overclock3d.net/news/cpu_mainboard/res…

You can read the paper using the following link if you wish to read it: www.cs.ucr.edu/~nael/pubs/asplos18.pdf

6 Likes | 2 Shares | 0 Comments
Replying to ...
Alexander Bourque
 

So overclock3d posted their performance review of #farcry5. Apparently in this game a Vega 56 is able to almost match the performance of a 1080 FE, possibly in part due to Rapid Packed Math support in the game.

If you don't know what Rapid Packed Math is here is a quote from the review that explains it:
"Rapid Packed Math allows AMD's Vega GPU architecture to offer a 2x performance boost when calculating FP16 math, giving developers the ability to accelerate specific workloads by using less precise… See More

mathematics. If using this kind of math can be done with lower precision with no visual downsides, developers can choose to use FP16 math to reduce memory bandwidth requirements on FP16 compliant hardware and offer a 2x performance boost on Radeon hardware which supports Rapid Packed Math. Rapid Packed Math does not require the use of a low-level API like DX12 or Vulkan, allowing Far Cry 5, a DirectX 11 game, to make use of the feature."

overclock3d.net/reviews/software/far_cry_5_pc_performance_review/1

1 Like | 0 Shares | 0 Comments
Replying to ...
Alexander Bourque
 

So according to #AMD the vulnerabilities revealed by CTS labs are real and will be fixed via firmware patches and bios updates, they don't expect any performance impact, however they do mention that since admin access is already required to exploit these the unauthorized individual would already have the right to create, delete, or modify any file or folder on the system.

overclock3d.net/news/cpu_mainboard/amd_responds_to_cts_labs_vulnerabilities_-_impact_assessment/1

4 Likes | 1 Share | 0 Comments
Replying to ...
Alexander Bourque
 

CTS-Labs an Israeli company created in 2017 has recently published a report about 13 vulnerabilities, technically 4 vulnerabilities with some variants. However they only gave #AMD 24 hours notice, from what I have read the standard notice is 90 days or more for hardware flaws, and had apparently already briefed analysts and the media before even notifying AMD so some people find this suspicious, and I am inclined to agree.

Sources below:
… See More

www.tomshardware.com/news/amd-flaws-ryzenfall-masterkey-fallout-chimera,36656.html
ir.amd.com/news-releases/news-release-details/view-our-corner-street-0
overclock3d.net/news/cpu_mainboard/severe_processor_vulnerabilities_discovered_on_amd_ryzen_processors_-_13_vulnerabilities_reported/1
www.anandtech.com/show/12525/security-researchers-publish-ryzen-flaws-gave-amd-24-hours-to-respond

8 Likes | 4 Shares | 2 Comments
Replying to ...
Christian Zehring
"Vertebrator" —  

I wouldn't be surprised if there are financial interests behind or they got paid by competitors - despite anything that company said...

0 Likes

Monica Mattsson
"MonaViCat" —  

i agree it seems odd

0 Likes

Alexander Bourque
 

OK so it appears #Intel released a list of product lines vulnerable to Meltdown & Spectre, I missed it before because none of the articles I had read linked to it but I just found it on a comment on Anandtech.
So if you have an Intel CPU in any of the product lines listed in the attached picture you are vulnerable to Meltdown and/or Spectre, in the case of Intel you are vulnerable to both but in the case of AMD & ARM you are only vulnerable to Spectre.

See More

security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr

1 Like | 1 Share | 0 Comments
Replying to ...