Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

SHLD isn't Any Faster than IMUL

Name: Anonymous 2019-07-30 9:57

https://software.intel.com/sites/default/files/managed/9e/bc/64-ia-32-architectures-optimization-manual.pdf


see instruction latency appendix. That means you can multiply without any hacks. But division is still much more expensive than right shift.

Name: Anonymous 2019-07-30 12:15

shift my anus

Name: Anonymous 2019-07-30 12:22

Anii >> "anii".length | -1




What does this code do?

Name: Anonymous 2019-07-30 12:34

>>1
Thats because Intel decided bithacks aren't important, AMD shifts faster.
https://gmplib.org/~tege/x86-timing.pdf

Name: Anonymous 2019-07-30 12:37

Even if SHLD is at same latency, by using fewer circuits it generates less heat and therefore allows higher performance overall(spending the volts more efficiently), and since its faster on AMD there is no reason to use expensive multiplies.

Name: Anonymous 2019-07-30 12:37

>>3
shoves it up your ass

Name: Anonymous 2019-07-30 18:05

>>4
I heard the opposite: Intel incorporated bithacks into imul microcode, so it checks for multiplication by a power of two and picks appropriate circuit.

Name: Anonymous 2019-07-30 18:06

>>7
Also, it is hard to botch shifts, because they are such basic operations.

Name: Anonymous 2019-08-08 8:40

>>7
so it checks for multiplication by a power of two and picks appropriate circuit.
Sounds great for a timing attack.

Name: Anonymous 2019-08-08 8:45

>>7,9
Actually, the gmp pdf does not say that multiplication is data dependent. Is it wrong? Maybe it is.
Apparently it is not that simple. http://repository.tue.nl/800603
Thanks bloated CPUs!

Name: Anonymous 2019-08-08 11:02

>>9
Security is overrated, and such exploits are rather hard to leverage. Still no news of somebody using even that Metldown to steal a single USD, yet Intel and AMD will make billions selling new immune hardware.

Name: Anonymous 2019-08-08 11:55

>>11
Security is overrated
No, see the recent thread about 8chan where it was revealed that improperly secured IoT devices are causing the internet to rely on gigantic CDNs to stay online, causing a shrinking of the internet into a TV-like model of only-kosher content. Security is precisely the technique that would have prevented this sad situation. So, overrated my ass.

Name: Anonymous 2019-08-08 12:33

>>12
1. Create p2p network to mitigate DDoS
2. Create a list of misconfigured IoT devices, pay a visit to their owners. After a few good old lynchings, there will be no misconfigured shit, with password=admin.

People should take control into their own hands. Police wont help, government wont help. Freedom requires responsibility and never-ending fight.

Name: Anonymous 2019-08-08 12:53

>>13
Its amazing how easy you can derail threads into incel terrorism, do they pay you or something?

Name: Anonymous 2019-08-08 13:08

>>13
The list is too long, since every single device is purposefully insecure since, like >>11 the developers said "suraksha anaavashyak hai" as the only real purpose of such devices is to spy on people. The fact it allows every non-corporate site to be ddosed of the internet is just a bonus I assume. I guess 1 is the future though.

Name: Anonymous 2019-08-08 13:16

>>15
After a few public executions from the list, others will instantly fix their devices. It is like with dirty houses in Germany: after Hitler executed one retard for not washing his windows, the whole street started shining with cleanliness.

Name: Anonymous 2019-08-08 13:28

>>16
You can't fix what isn't broken, and nobody is going to give up their Alexa, Google Home, Sonos One, Apple HomePod, Riva Concert, or any other top-tier smartspeaker just because *a *few* people got killed for having them. I don't think you understand just how useful the convenience these devices offer is.

Name: Anonymous 2019-08-08 13:30

>>17
At least they will set proper passwords.

Name: Anonymous 2019-08-08 13:49

>>11
Meltdown is not a problem if you do not have buggy programs that let the glowing ones run code on your machine. Meanwhile timing attacks are a real threat - even if all of your programs are bug free some asshole can steal all of your private keys.

Name: Anonymous 2019-08-08 16:26

>>19
1. Don't store your private keys in memory.
2. Use address space randomization.

Name: Anonymous 2019-08-08 18:30

>>20
1. Don't store your private keys in memory.
This does not affect anything. You can still have timing attacks even if you do not store them in memory.

2. Use address space randomization.
Address space randomization is a useless crap that has nothing to do with timing attacks. It only kinda but not really defends against russian snowniggers using buggy programs to gain access to your computer.

Name: Anonymous 2019-08-08 19:14

>>21
This does not affect anything. You can still have timing attacks even if you do not store them in memory.
They are on HDD most of the time, then getting timing right makes it hard.

Address space randomization is a useless crap that has nothing to do with timing attacks
If you don't know where the shit is and how it gets accessed, you can't time processing of it in any predictable way, because the order of say page faults and cache misses would be different for each run.

Name: Anonymous 2019-08-08 23:56

>>22
They are on HDD most of the time, then getting timing right makes it hard.
I don't get what you are on about. Also, this is nothing but an assumption on your part. Ephemeral keys are used all the time for example - these are never stored on the disk, only in memory (or in the cpu cache).

If you don't know where the shit is and how it gets accessed
We do not care about that. We only care about the timing.

you can't time processing of it in any predictable way
I will just average it out.

Name: Anonymous 2019-08-09 9:45

>>23
I will just average it out.
Averaging strips precision and requires large statistical base. You will have to literally DDoS the attacked machine. You will get noticed and give yourself up.

Name: Anonymous 2019-08-09 21:31

>>24
Just run some shitty javashit code when you visit a site.

Name: Anonymous 2019-08-10 19:19

Division is hard:
https://stackoverflow.com/questions/4125033/floating-point-division-vs-floating-point-multiplication
Unlike every other ALU operation, division latency/throughput is data-dependent on some CPUs. Again, this is because it's so slow and not fully pipelined. Out-of-order scheduling is easier with fixed latencies, because it avoids write-back conflicts (when the same execution port tries to produce 2 results in the same cycle, e.g. from running a 3 cycle instruction and then two 1-cycle operations).

Don't change these.
Name: Email:
Entire Thread Thread List