In order for me to trust AMD's implementation, they first need to can
that ridiculous Platform "Security" Processor. It is as useless and
dangerous as Intel Management Engine, running unknown code.

A more plausible attack would be an application using malloc() for a
large segment of memory, and transmitting the "uninitialised" content,
which could contain private keys, sensitive documents, etc. from
applications that either don't zero the memory after finishing, or
programs which have crashed and the memory is now freely available
to other processes.

It would be nice in those cases to have different
keys for different pages, so that when a process is terminated, the
kernel can (instruct the CPU to) overwrite the key with a new random
number.

On Sat, 11 Mar 2017 20:18:37 +0000 (UTC)
Christian Weisgerber <na...@mips.inka.de> wrote:

> AMD thinks so.  Last year they announced support for memory encryption
> in future CPUs.  The top two Google hits:
> 
> http://amd-dev.wpengine.netdna-cdn.com/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf
> https://events.linuxfoundation.org/sites/events/files/slides/AMD%20x86%20Memory%20Encryption%20Technology%20LSS%20Slides.pdf

Reply via email to