Practical Timing Side Channel Attacks on Memory Compression

Поиск
Список
Период
Сортировка
От Filip Janus
Тема Practical Timing Side Channel Attacks on Memory Compression
Дата
Msg-id CAFjYY+KZmYWM26YeJGy2Wxm-=MiMaaoQ02hejyN1W7C9brLD0g@mail.gmail.com
обсуждение исходный текст
Ответы Re: Practical Timing Side Channel Attacks on Memory Compression  (Robert Haas <robertmhaas@gmail.com>)
Список pgsql-hackers
Hi all,
A few months ago a group of researchers published a paper about LZ77 vulnerability[1]. And it also affects PGLZ. From my point of view, it could be a really dangerous issue for some kind of application. If I understand it correctly there is a possibility of leaking approx. 24B secret data per hour(but it depends on HW configuration).

I understand that there is no simple and easy solution.  But I would like to know Your opinion on this. Or if you have any plan on how to deal with this?

Thanks

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Michael Paquier
Дата:
Сообщение: Re: [PATCH] Expose port->authn_id to extensions and triggers
Следующее
От: Alvaro Herrera
Дата:
Сообщение: Re: shared-memory based stats collector - v70