Zen 5 processors do not lose performance when neutralizing architectural vulnerabilities

AMD’s Zen 5 architecture has set new standards in the processor world by combining enhanced performance and security. Tests of the Ryzen 9 9950X show that built-in Inception protection not only eliminates the need for resource-intensive software patches, but also maintains its performance when other security measures are enabled.

Image Source: AMD

Zen 5 has proven to be an architecture that is completely immune to the Inception vulnerability without the need for patches at the microcode, operating system or application level. To evaluate the real impact of various security measures on performance, Phoronix resource experts tested the Ryzen 9 9950X processor based on Zen 5 in a Linux environment. The methodology included a series of tests that alternately enabled and disabled all available software protection tools, which allowed us to create a complete picture of performance in various security scenarios.

Phoronix research has shown that Zen 5 has built-in hardware protection against the Inception vulnerability, a speculative side-channel attack discovered in 2023. This vulnerability, affecting processors based on the Zen 3 and Zen 4 architectures, allowed attackers to use speculative execution mechanisms to extract sensitive information from system memory. The potential leakage of privileged data posed a serious security risk, making the development of effective security a critical issue for AMD.

Unlike their predecessors, Zen 5 processors do not require resource-intensive software patches to counteract this vulnerability. The difference is especially noticeable when compared to Zen 3: enabling software Inception protections on this architecture could result in a significant performance hit of up to 54% on certain workloads.

Comparative performance analysis of AMD Zen 5 processors with security measures enabled and disabled (image source: Phoronix, Tom’s Hardware)

Paradoxically, the architectures of previous generations of AMD – Zen 1, Zen+ and Zen 2 – turned out to be immune to Inception. This remarkable fact is explained by the implementation features of the branch prediction block in these architectures. Their relative “simplicity” unexpectedly turned out to be an advantage, showing that sometimes less aggressive optimization methods can be more resistant to certain types of attacks.

Despite the introduction of hardware-based Inception protection, Zen 5 processors still rely on software measures to combat other vulnerabilities, including the infamous Specter V1. However, the test results are striking: activating these measures has virtually no impact on the performance of Zen 5. This unexpected finding contradicts the popular belief that any additional security measures will inevitably reduce processor performance.

admin

Share
Published by
admin

Recent Posts

An insider has revealed the main source of inspiration for the multiplayer Assassin’s Creed Invictus – Fall Guys

Image Source: Mediatonic Among the available formats are team deathmatch, every man for himself, and…

1 hour ago

Seasonic has released a PRIME PX-2200 power supply with a power of 2200 W for $500

Seasonic has released the PRIME PX-2200 2200 W power supply. The new product was first…

1 hour ago

Mercedes-Benz accelerated its third-level autopilot to 95 km/h

The ability of modern automation to control vehicles without human intervention is limited by a…

1 hour ago

GPUs limit programming freedom, so more chips will appear in the field of AI – Lisa Su

GPUs, originally created for creating three-dimensional images, have performed well in the field of accelerating…

2 hours ago

Samsung Display will build an OLED display plant in Vietnam

South Korean electronics maker Samsung Display plans to invest $1.8 billion this year to build…

2 hours ago