Unveiling the Outcome of Branches in Victim Programs through a Precise Attack: The Taram Technique

Computer Scientists Reveal New Cybsersecurity Threats

Kazem Taram, an assistant professor of computer science at Purdue University and a UC San Diego computer science PhD graduate, has developed a powerful microarchitectural control-flow extraction attack that can reveal the outcome of almost any branch in almost any victim program. This makes it one of the most precise and powerful attacks of its kind.

The work was coauthored by Dean Tullsen, Hosein Yavarzadeh, Archit Agarwal, and Deian Stefan from UC San Diego, as well as researchers from Purdue University, Google, Georgia Tech, and the University of North Carolina Chapel Hill. Funding for this research came from various sources including the Air Force Office of Scientific Research, the Defense Advanced Research Projects Agency, the National Science Foundation, the Alfred P. Sloan Research Fellowship, and gifts from Intel, Qualcomm, and Cisco.

In November 2023, the security findings were disclosed to both Intel and AMD. Intel has informed other affected hardware/software vendors about the issues identified. Both Intel and AMD have plans to address the concerns raised in the research through Security Announcements and Bulletins. The findings have also been shared with the Vulnerability Information and Coordination Environment (VICENE) with a specific reference to Class of Attack Primitives Enable Data Exposure on High End Intel CPUs.

Leave a Reply