Article 50MEZ The Brutal Performance Impact From Mitigating The LVI Vulnerability

The Brutal Performance Impact From Mitigating The LVI Vulnerability

by
from Phoronix on (#50MEZ)
On Tuesday the Load Value Injection (LVI) attack was disclosed by Intel and security researchers as a new class of transient-execution attacks and could lead to injecting data into a victim program and in turn stealing data, including from within SGX enclaves. While Intel has publicly stated they don't believe the LVI attack to be practical, one of their open-source compiler wizards did go ahead and add mitigation options to the GNU Assembler as part of the GCC toolchain. Here are benchmarks showing the performance impact of enabling those new LVI mitigation options and the significant impact they can cause on run-time performance in real-world workloads.
External Content
Source RSS or Atom Feed
Feed Location http://www.phoronix.com/rss.php
Feed Title Phoronix
Feed Link https://www.phoronix.com/
Reply 0 comments