"amdflaws.com" - What is this?

Page 12 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

ao_ika_red

Golden Member
Aug 11, 2016
1,679
715
136
CTS Labs Responds to Allegations of Bad Faith Over AMD CPU Security Disclosures, Digs Itself a Deeper Hole

Looks like they're also claiming they compromised Intel motherboards with ASMedia chips as well.

Should have been asmediaflaws.com if anything.
Wait a minute. I thought from the day one, these vulnerabilities exploit ARM's TrustZone inside Zen uarch and probably Excavator as well. I also knew that ASMedia chip had some contribution on it, but nothing like what Joel from ExtremeTech descibed. Need a quick recap here.
 
Reactions: footballrunner800

Hitman928

Diamond Member
Apr 15, 2012
5,611
8,826
136
Here is a video with Ian Cutress talking about all this: https://www.youtube.com/watch?v=cj3_AILPvU0

It's a long watch but there are some good details in there about the story and his call with CTS. Lots of questions he posed with no real answer, deflections, obvious lack of understanding of the modern server/compute environment, lack of understanding of modern security protocol, certain elements of their story changing, outright lying (according to other industry contacts) about not being able to share details with anandtech due to Israeli law, etc.

Ian is careful about not drawing complete conclusions which he shouldn't given his position and lack of expertise in all these areas, but luckily we don't have that standard in a casual tech forum and can call a spade a spade.
 

Markfw

Moderator Emeritus, Elite Member
May 16, 2002
25,752
14,783
136
It's a long watch but there are some good details in there about the story and his call with CTS. Lots of questions he posed with no real answer, deflections, obvious lack of understanding of the modern server/compute environment, lack of understanding of modern security protocol, certain elements of their story changing, outright lying (according to other industry contacts) about not being able to share details with anandtech due to Israeli law, etc.

Ian is careful about not drawing complete conclusions which he shouldn't given his position and lack of expertise in all these areas, but luckily we don't have that standard in a casual tech forum and can call a spade a spade.
I just watched half of it. I agree completely. Its like Ian was saying "its all crap, they don't know what they are doing, its probably just PR....etc", but he was very careful to not actually say that. I think he did great.

Disclaimer: While an Anandtech moderator, I don't get paid, and I would call him out in a second if I thought he was wrong or lying.
 

moinmoin

Diamond Member
Jun 1, 2017
4,994
7,765
136
I just wish his article would better reflect the stance he showcases in the video.

Edit: Just read the new article/interview/commentary. That one's quite fine in isolation.
 
Last edited:

ao_ika_red

Golden Member
Aug 11, 2016
1,679
715
136
Wait a minute. I thought from the day one, these vulnerabilities exploit ARM's TrustZone inside Zen uarch and probably Excavator as well. I also knew that ASMedia chip had some contribution on it, but nothing like what Joel from ExtremeTech descibed. Need a quick recap here.
Now I get a clearer picture about this. Like formulav8 said, it should be asmediaflaws.com. As for TrustZone feature (thanks for addressing it, Ian!), somehow it only affects Zen-based CPU and not others.
 

formulav8

Diamond Member
Sep 18, 2000
7,004
522
126
haha

IC: Most enterprise level networks are built upon systems that rely on virtual machines (VMs), or use thin clients to access VMs. In this circumstance no OS has bare metal access due to the hypervisor unless the system is already compromised…

ILO: Can I stop you there? That is not correct. That is entirely incorrect. We are talking about companies. You know we have a company here – imagine you had a company with four floors with workstations for employees that run Windows and sometimes you have a domain environment on the network….

IC: Those are desktop systems, I specified enterprise.

ILO: Yeah, this is enterprise, this is a company. As I said it has four floors with computers inside. They may be running Ryzen Pro workstations. They may have a Microsoft Windows Domain server, maybe a file server, and what we are talking about here is lateral movement inside corporate networks like this one. This is ABC, this is what happens on TSX all over the world with reports about how Chinese hackers behave when they hack US companies and this is how it looks like.
 

formulav8

Diamond Member
Sep 18, 2000
7,004
522
126
I doubt Ian will get any straight/complete answers to these very simple, easy to answer questions.

This call took place at 1:30pm ET on 3/14. After the call, we sent a series of 15 questions to CTS-Labs at 6:52pm ET on the same day. As of 7:10pm ET on 3/15, we have not had a response. These questions included elements related to
  • The use of a PR firm which is non-standard practice for this (and the PR firm were not involved in any way in our call, which is also odd),
  • Viceroy Research, a company known for shorting stock, and their 25-page blowout report published only three hours after the initial announcement,
  • And the 2018 SEC listing of the CFO as the President of NineWells Capital, a hedge fund based in New York, that has interests in equity, corporate debt investments, and emphasis on special situations.
 

PeterScott

Platinum Member
Jul 7, 2017
2,605
1,540
136
When asked about the ambush time window for AMD:

On the other hand, I think that it also gives the vendors a lot of control on how it wants to address these vulnerabilities and they can first deal with the problem then come out with their own PR about the problem, I’m speaking generally and not about AMD in particular here, and in general they attempt to minimize the significance. If the problem is indicative of a widespread issue, as is the case with the AMD processors, then the company will company probably would want to minimize it and to play it down.

Yes, give AMD time to understand and explain the problem properly and the FUD evaporates and it's hard to profit for their Short position on AMD.
 

Hitman928

Diamond Member
Apr 15, 2012
5,611
8,826
136
Now I get a clearer picture about this. Like formulav8 said, it should be asmediaflaws.com. As for TrustZone feature (thanks for addressing it, Ian!), somehow it only affects Zen-based CPU and not others.

At some place they said clearly that they tested against others secure processors and didn't worked?

If I remember right, in the video interview, Ian says that CTS says it only works on AMD Ryzen but Ian kind of questions why that would be and it basically comes down to CTS not knowing if it would work on any other trustzone platforms because they never approached ARM about the issue or tried it on other platforms despite claiming that all it takes is running an exe. Ian then suggests in the interview that even if the exact same attack doesn't work, that most likely it could be tweaked to achieve the same results (assuming it works as they say in the first place).
 

csbin

Senior member
Feb 4, 2013
858
412
136


https://www.anandtech.com/show/12536/our-interesting-call-with-cts-labs


It seems a bit odd for a company looking into ASMedia related flaws to then turn their focus onto AMD’s secure processor, using the chipset vulnerabilities as a pivot point. ASMedia chips, especially the USB host controllers cited by CTS-Labs, are used on literally tens of millions of Intel-based motherboards around the world, from all the major OEMs. For a large period of time, it was hard to find a system without one. The decision to pivot on newer AMD platforms is a weak argument, the wishy-washy language when discussing projects at the start of the company’s existence, and the abrupt ending to the call when asked to discuss the original customer could be construed (this is conjecture here) that the funding for the product was purposefully directional towards AMD.


IC: Can you describe how you came up with the names for these exploits?

YLZ: It was our creativity and fervent imagination.

IC: Did you pre-brief the press before you spoke to AMD?

ILO: What do you mean by pre-brief the press?

IC: We noticed that when the information went live, some press were ready to go with relevant stories and must have had the information in advance.

ILO: Before our announcement you mean?

IC: Correct.

ILO: I would have to check the timing on that and get back to you, I do not know off the top of my head.

DK: I think the biggest question that I still have is that ultimately who originated this request for analysis – who was the customer that kicked this all off?

ILO: I definitely am not going to comment on our customers.

DK: What about the flavor of customer: is it a semiconductor company, is it someone in the industry, or is it someone outside the industry? I don’t expect you to disclose the name but the genre seems quite reasonable.

ILO: Guys I’m sorry we’re really going to need to jump off this call but feel free to follow up with any more questions.
 

TheRyuu

Diamond Member
Dec 3, 2005
5,479
14
81
In all likelihood they were trying to short AMD stock by using the vulnerabilities[1]. Beyond this I'm not sure why everyone is so up in arms about this whole situation. CTS doesn't owe anyone anything and they don't have any obligation to whatever vendor they might be working on. You could even argue it's probably better they just let it out than sitting on it for months/years.

[1] https://news.ycombinator.com/item?id=16598061
 

urvile

Golden Member
Aug 3, 2017
1,575
474
96
It's a long watch but there are some good details in there about the story and his call with CTS. Lots of questions he posed with no real answer, deflections, obvious lack of understanding of the modern server/compute environment, lack of understanding of modern security protocol, certain elements of their story changing, outright lying (according to other industry contacts) about not being able to share details with anandtech due to Israeli law, etc.

Ian is careful about not drawing complete conclusions which he shouldn't given his position and lack of expertise in all these areas, but luckily we don't have that standard in a casual tech forum and can call a spade a spade.

It gets odder and odder. I don't think any of us are security experts but I am sure most of us know more stuff than the average person. I am also sure Ian is more than qualified to call BS. Anyways. The mysterious case of CTS Labs eh?
 

sandorski

No Lifer
Oct 10, 1999
70,128
5,657
126
In all likelihood they were trying to short AMD stock by using the vulnerabilities[1]. Beyond this I'm not sure why everyone is so up in arms about this whole situation. CTS doesn't owe anyone anything and they don't have any obligation to whatever vendor they might be working on. You could even argue it's probably better they just let it out than sitting on it for months/years.

[1] https://news.ycombinator.com/item?id=16598061

It's Scam, Scammers should be in jail.
 

TheRyuu

Diamond Member
Dec 3, 2005
5,479
14
81
It's Scam, Scammers should be in jail.

And what exactly did they do that was illegal? Trading on non-public information that you got from your own research and then announcing it is not illegal. How much you stand to gain may be up for debate however.
 

sandorski

No Lifer
Oct 10, 1999
70,128
5,657
126
And what exactly did they do that was illegal? Trading on non-public information that you got from your own research and then announcing it is not illegal. How much you stand to gain may be up for debate however.

If they have shorted stock, they have damaged not just AMD for their own gain, but AMD shareholders as well. Such an act has potential of $billions in damage.
 
Reactions: DarthKyrie

dacostafilipe

Senior member
Oct 10, 2013
772
244
116
Hardware.fr has, as always, a great article about this story: (french) https://www.hardware.fr/news/15366/failles-securite-specifiques-aux-ryzen.html

The interesting part is that they think that the CTS flaws are "inspired" from issues Goggle's Project Zero reported some time ago: https://googleprojectzero.blogspot.lu/2017/07/trust-issues-exploiting-trustzone-tees.html

Important parts that hardware.fr highlighted:

"And what of Trustonic's TEE? Unlike QSEE's model, trustlets are unable to map-in and modify physical memory. In fact, the security model used by Trustonic ensures that trustlets aren't capable of doing much at all. Instead, in order to perform any meaningful operation, trustlets must send a request to the appropriate “driver”. This design is conducive to security, as it essentially forces attackers to either compromise the drivers themselves, or find a way to leverage their provided APIs for nefarious means. Moreover, as there aren't as many drivers as there are trustlets, it would appear that auditing all the drivers in the TEE is indeed feasible. "

" Although trustlets aren't granted different sets of “capabilities”, drivers can distinguish between the trusted applications requesting their services by using the caller's UUID. Essentially, well-written drivers can verify that whichever application consumes their services is contained within a “whitelist”, thus minimising the exposed attack surface. Sensitive operations, such as mapping-in and modifying physical memory are indeed unavailable to trusted applications. They are, however, available to any driver. As a result, driver authors must be extremely cautious, lest they unintentionally provide a service which can be abused by a trustlet."
 

dlerious

Golden Member
Mar 4, 2004
1,815
734
136
In all likelihood they were trying to short AMD stock by using the vulnerabilities[1]. Beyond this I'm not sure why everyone is so up in arms about this whole situation. CTS doesn't owe anyone anything and they don't have any obligation to whatever vendor they might be working on. You could even argue it's probably better they just let it out than sitting on it for months/years.

[1] https://news.ycombinator.com/item?id=16598061
What about the vendors customers? It's OK to put them at risk just to make a couple dollars?
 

Dribble

Platinum Member
Aug 9, 2005
2,076
611
136
If they have shorted stock, they have damaged not just AMD for their own gain, but AMD shareholders as well. Such an act has potential of $billions in damage.
Shorting stock is not illegal, it's what investors on the stock market do all the time. Using information you have that others don't is not illegal unless that information was gained illegally (e.g. insider trading). The stock market is just another form of gambling where everyone plays every edge they can to it's full advantage, it's not there to be nice and fair.

What about the vendors customers? It's OK to put them at risk just to make a couple dollars?
Of course not, but when it comes to making lots money people are fast to put their morals aside. Look how many people on these forums mine crypto (another form of gambling) despite it basically wasting the earths resources for no real gain, and greasing the wheels of the criminal underworld (you pay for your drugs, guns, slaves, child porn in crypto). Not so much protest for an activity that's making geeks here money despite it being arguably worse then what CTS are doing.
 

Zstream

Diamond Member
Oct 24, 2005
3,396
277
136
Shorting stock is not illegal, it's what investors on the stock market do all the time. Using information you have that others don't is not illegal unless that information was gained illegally (e.g. insider trading). The stock market is just another form of gambling where everyone plays every edge they can to it's full advantage, it's not there to be nice and fair.


Of course not, but when it comes to making lots money people are fast to put their morals aside. Look how many people on these forums mine crypto (another form of gambling) despite it basically wasting the earths resources for no real gain, and greasing the wheels of the criminal underworld (you pay for your drugs, guns, slaves, child porn in crypto). Not so much protest for an activity that's making geeks here money despite it being arguably worse then what CTS are doing.

And here we go. Blatant defense of scum. First off I won’t address your mining bull crap, especially as gun ownership is a right in the usa.

We clearly disagree on what the definition of scum is. Anyone who does this, is scum. I’ll just place you on ignore.
 

Zstream

Diamond Member
Oct 24, 2005
3,396
277
136
And what exactly did they do that was illegal? Trading on non-public information that you got from your own research and then announcing it is not illegal. How much you stand to gain may be up for debate however.

Wow, people with low post counts from circa 2006 are sure coming and posting in spades. I sure hope it’s not the same person, or people from Israel..
 

zinfamous

No Lifer
Jul 12, 2006
110,810
29,564
146
In all likelihood they were trying to short AMD stock by using the vulnerabilities[1]. Beyond this I'm not sure why everyone is so up in arms about this whole situation. CTS doesn't owe anyone anything and they don't have any obligation to whatever vendor they might be working on. You could even argue it's probably better they just let it out than sitting on it for months/years.

[1] https://news.ycombinator.com/item?id=16598061

"beyond this I'm not sure...."

huh?

If you just stop on "this," we are talking fraud. No one really needs to go beyond "this" to get worked about fraud. ...but it seems maybe there is more beyond "this." The kid's abrupt departure from the call when pressed about their funding. Seems sketchy, no?
 

formulav8

Diamond Member
Sep 18, 2000
7,004
522
126
And here we go

I understand you're upset, but he is correct. It's not illegal to short the stock market. IMO shorting is legalized gambling but it's perfectly legal to do. The way they went about all of this is highly unethical, especially if they were in league with Viceroy and others. Not even telling AMD about the issue first and going straight to the press is obviously the wrong thing to do. But I don't see AMD bringing them to court.

It looks like CTS's plan is backfiring as well. And I definitely don't see anyone using their services in the future.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |