summary refs log tree commit diff stats
path: root/results/classifier/zero-shot/108/other/2946
diff options
context:
space:
mode:
authorChristian Krinitsin <mail@krinitsin.com>2025-07-03 19:39:53 +0200
committerChristian Krinitsin <mail@krinitsin.com>2025-07-03 19:39:53 +0200
commitdee4dcba78baf712cab403d47d9db319ab7f95d6 (patch)
tree418478faf06786701a56268672f73d6b0b4eb239 /results/classifier/zero-shot/108/other/2946
parent4d9e26c0333abd39bdbd039dcdb30ed429c475ba (diff)
downloadqemu-analysis-dee4dcba78baf712cab403d47d9db319ab7f95d6.tar.gz
qemu-analysis-dee4dcba78baf712cab403d47d9db319ab7f95d6.zip
restructure results
Diffstat (limited to 'results/classifier/zero-shot/108/other/2946')
-rw-r--r--results/classifier/zero-shot/108/other/294625
1 files changed, 25 insertions, 0 deletions
diff --git a/results/classifier/zero-shot/108/other/2946 b/results/classifier/zero-shot/108/other/2946
new file mode 100644
index 000000000..4fb82888a
--- /dev/null
+++ b/results/classifier/zero-shot/108/other/2946
@@ -0,0 +1,25 @@
+graphic: 0.762
+network: 0.728
+device: 0.599
+other: 0.554
+semantic: 0.394
+vnc: 0.305
+permissions: 0.216
+socket: 0.194
+files: 0.189
+performance: 0.185
+PID: 0.133
+debug: 0.105
+boot: 0.090
+KVM: 0.056
+
+crypto/aes.c (used for emulating aes instructions) has a timing side-channel
+Description of problem:
+https://gitlab.com/qemu-project/qemu/-/blob/a9cd5bc6399a80fcf233ed0fffe6067b731227d8/crypto/aes.c#L1021
+
+much of the code in crypto/aes.c accesses memory arrays where the array index is based on the secret data being encrypted/decrypted. because of cpu caches and other things that can delay memory accesses based on their address, this is a timing side-channel, potentially allowing leaking secrets over a network based on timing how long cryptography operations take.
+
+compare to openssl which uses an algorithm where its execution time doesn't depend on the data being processed:
+https://github.com/openssl/openssl/commit/0051746e03c65f5970d8ca424579d50f58a877e0
+
+I initially reported this as a security issue, but was told that since it's only used by TCG, it isn't a security issue, since TCG isn't considered secure.