{"guid":"4c2cd189-b216-4246-88ab-8d1bb11cbe9e","title":"Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en)","subtitle":null,"slug":"rc3-11404-attacking_cpus_with_power_side_channels_from_software_warum_leaked_hier_strom_en","link":"https://fahrplan.events.ccc.de/rc3/2020/Fahrplan/events/11404.html","description":"Everyone knows and loves the famous line from the cinematic masterpiece where the IT-Security specialist asks the CPU architect: \"Warum leaked hier Strom?\" (Why is power leaking here?).\n\nIn this talk, we want to answer that question. We demonstrate how we can attack modern processors purely in software, relying on techniques from classical power side-channel attacks. We explain how we abuse the unprivileged access to energy-monitoring features of modern Intel and AMD CPUs. With PLATYPUS, we show how to steal cryptographic keys from the operating system or trusted-execution environments, and how to break kernel address-space layout randomization within seconds. Finally, we discuss the mitigations that prevent our attacks.","original_language":"eng","persons":["Moritz Lipp","Michael Schwarz","Daniel Gruss","Andreas Kogler"],"tags":["rc3-mcr","11404","2020","IT-Security","main"],"view_count":1970,"promoted":false,"date":"2020-12-28T19:20:00.000+01:00","release_date":"2020-12-31T00:00:00.000+01:00","updated_at":"2026-01-19T13:45:16.115+01:00","length":3556,"duration":3556,"thumb_url":"https://static.media.ccc.de/media/events/rc3/11404-4c2cd189-b216-4246-88ab-8d1bb11cbe9e.jpg","poster_url":"https://static.media.ccc.de/media/events/rc3/11404-4c2cd189-b216-4246-88ab-8d1bb11cbe9e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/rc3/11404-4c2cd189-b216-4246-88ab-8d1bb11cbe9e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/rc3/11404-4c2cd189-b216-4246-88ab-8d1bb11cbe9e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/rc3-11404-attacking_cpus_with_power_side_channels_from_software_warum_leaked_hier_strom_en","url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_title":"Remote Chaos Experience","conference_url":"https://api.media.ccc.de/public/conferences/rc3","related":[],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.en.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2023-09-02T02:40:15.259+02:00","recording_url":"https://cdn.media.ccc.de/events/rc3/rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.en.srt","url":"https://api.media.ccc.de/public/recordings/69692","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.en.srt","state":"complete","folder":"2020","high_quality":true,"width":null,"height":null,"updated_at":"2021-12-27T18:04:33.458+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/2020/rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.en.srt","url":"https://api.media.ccc.de/public/recordings/50303","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":438,"length":3556,"mime_type":"video/webm","language":"eng-deu","filename":"rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-01-02T01:13:09.107+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/webm-hd/rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/49744","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":33,"length":3556,"mime_type":"audio/opus","language":"eng","filename":"rc3-mcr-11404-eng-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2020-12-31T02:47:26.399+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/opus/rc3-mcr-11404-eng-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_opus.opus","url":"https://api.media.ccc.de/public/recordings/49780","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":54,"length":3556,"mime_type":"audio/mpeg","language":"eng","filename":"rc3-mcr-11404-eng-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2020-12-31T02:47:10.644+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/mp3/rc3-mcr-11404-eng-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/49779","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":197,"length":3556,"mime_type":"video/webm","language":"eng-deu","filename":"rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-01-03T23:17:34.769+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/webm-sd/rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/49743","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":197,"length":3556,"mime_type":"video/mp4","language":"eng-deu","filename":"rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2020-12-31T02:33:43.421+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/h264-sd/rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_sd.mp4","url":"https://api.media.ccc.de/public/recordings/49742","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":481,"length":3556,"mime_type":"video/mp4","language":"eng-deu","filename":"rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-12-31T01:07:52.808+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/h264-hd/rc3-mcr-11404-eng-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en_hd.mp4","url":"https://api.media.ccc.de/public/recordings/49702","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":426,"length":3556,"mime_type":"video/mp4","language":"deu","filename":"rc3-mcr-11404-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-12-31T01:07:00.293+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/h264-hd/rc3-mcr-11404-deu-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.mp4","url":"https://api.media.ccc.de/public/recordings/49701","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"},{"size":426,"length":3556,"mime_type":"video/mp4","language":"eng","filename":"rc3-mcr-11404-eng-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-12-31T01:05:56.974+01:00","recording_url":"https://cdn.media.ccc.de/events/rc3/h264-hd/rc3-mcr-11404-eng-Attacking_CPUs_with_Power_Side_Channels_from_Software_Warum_leaked_hier_Strom_en.mp4","url":"https://api.media.ccc.de/public/recordings/49700","event_url":"https://api.media.ccc.de/public/events/4c2cd189-b216-4246-88ab-8d1bb11cbe9e","conference_url":"https://api.media.ccc.de/public/conferences/rc3"}]}