Intel processor recently exposed the serious security vulnerabilities Feet panic, then belong to the x86 architecture camp in the end AMD in the end how? Today, AMD officials made a detailed response to this, AMD users can put the hanging heart down It's
AMD first reminded, The studies mentioned in the most recent report were carried out under a controlled, specialized laboratory environment by highly knowledgeable teams utilizing the very specific and unpublished information of the processor under study and the threats described were not yet available in public Field appears.
This applies to both Intel and AMD, so users of any product need not be overly alarmed.
When AMD learns that the discovery of this new attack on speculative execution features used by many chipmakers' products, AMD immediately collaborates with the ecosystem as a whole.
Security researchers found three ways to attack in this presumptive execution study, a detailed description of each attack, AMD's response is as follows:
Way one is Bypass the border check.
AMD processors can be addressed through software / operating system updates from system vendors and manufacturers with minimal performance impact.
Way two is Branch target injection.
Due to the different AMD architecture, the risk of using this approach to attack is almost zero, not yet found on AMD processors related vulnerabilities.
Way three is Malicious data cache load.
Due to different AMD architectures, the vulnerability does not exist on AMD products.
AMD also strongly recommends that users always take security measures such as: Do not click on unknown links, enforce strong password protocols, use secure networks, and perform regular software updates.