pub enum Exploitability {
SharedHardwareOnly,
Http2Multiplexing,
StandardRemote,
ObviousLeak,
}Expand description
Exploitability assessment based on effect magnitude.
Based on Crosby et al. (2009) thresholds for timing attack feasibility. These thresholds are heuristics based on academic research for risk prioritization, not guarantees. The thresholds reflect modern attack techniques including HTTP/2 multiplexing (Timeless Timing Attacks) and shared-hardware attacks (KyberSlash, Flush+Reload).
See spec Section 5.4 (Exploitability).
Variants§
Effect < 10 ns: Requires shared hardware to exploit.
Only exploitable by attackers with physical co-location: SGX enclaves, hyperthreading on same core, containers on same host, or cross-VM on shared cache. Remote exploitation is impractical.
References: KyberSlash (2024), Flush+Reload, Prime+Probe literature
Http2Multiplexing
10-100 ns: Exploitable via HTTP/2 request multiplexing.
Requires ~100k concurrent HTTP/2 requests to exploit. The “Timeless Timing Attacks” technique eliminates network jitter by sending requests that arrive simultaneously, making response order reveal timing differences.
Reference: Van Goethem et al., “Timeless Timing Attacks” (USENIX Security 2020)
StandardRemote
100 ns - 10 μs: Exploitable with standard remote timing.
Requires ~1k-10k requests using traditional timing techniques. Exploitable on LAN with any protocol, or over internet with HTTP/2.
References: Crosby et al. (2009), Brumley & Boneh (2005)
ObviousLeak
10 μs: Obvious timing leak, trivially exploitable.
Detectable with < 100 requests. Exploitable over the internet even with high-jitter connections using traditional timing techniques.
Implementations§
Source§impl Exploitability
impl Exploitability
Sourcepub fn from_effect_ns(effect_ns: f64) -> Exploitability
pub fn from_effect_ns(effect_ns: f64) -> Exploitability
Determine exploitability from effect size in nanoseconds.
Thresholds are based on:
- < 10 ns: Below HTTP/2 timing precision, requires shared hardware
- 10-100 ns: Within HTTP/2 “Timeless Timing Attacks” range
- 100 ns - 10 μs: Standard remote timing attack range
-
10 μs: Trivially observable
Trait Implementations§
Source§impl Clone for Exploitability
impl Clone for Exploitability
Source§fn clone(&self) -> Exploitability
fn clone(&self) -> Exploitability
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moreSource§impl Debug for Exploitability
impl Debug for Exploitability
Source§impl<'de> Deserialize<'de> for Exploitability
impl<'de> Deserialize<'de> for Exploitability
Source§fn deserialize<__D>(
__deserializer: __D,
) -> Result<Exploitability, <__D as Deserializer<'de>>::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(
__deserializer: __D,
) -> Result<Exploitability, <__D as Deserializer<'de>>::Error>where
__D: Deserializer<'de>,
Source§impl Display for Exploitability
impl Display for Exploitability
Source§impl PartialEq for Exploitability
impl PartialEq for Exploitability
Source§impl Serialize for Exploitability
impl Serialize for Exploitability
Source§fn serialize<__S>(
&self,
__serializer: __S,
) -> Result<<__S as Serializer>::Ok, <__S as Serializer>::Error>where
__S: Serializer,
fn serialize<__S>(
&self,
__serializer: __S,
) -> Result<<__S as Serializer>::Ok, <__S as Serializer>::Error>where
__S: Serializer,
impl Copy for Exploitability
impl Eq for Exploitability
impl StructuralPartialEq for Exploitability
Auto Trait Implementations§
impl Freeze for Exploitability
impl RefUnwindSafe for Exploitability
impl Send for Exploitability
impl Sync for Exploitability
impl Unpin for Exploitability
impl UnwindSafe for Exploitability
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<Q, K> Equivalent<K> for Q
impl<Q, K> Equivalent<K> for Q
Source§fn equivalent(&self, key: &K) -> bool
fn equivalent(&self, key: &K) -> bool
key and return true if they are equal.Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left is true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left(&self) returns true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§impl<T> Pointable for T
impl<T> Pointable for T
Source§impl<SS, SP> SupersetOf<SS> for SPwhere
SS: SubsetOf<SP>,
impl<SS, SP> SupersetOf<SS> for SPwhere
SS: SubsetOf<SP>,
Source§fn to_subset(&self) -> Option<SS>
fn to_subset(&self) -> Option<SS>
self from the equivalent element of its
superset. Read moreSource§fn is_in_subset(&self) -> bool
fn is_in_subset(&self) -> bool
self is actually part of its subset T (and can be converted to it).Source§fn to_subset_unchecked(&self) -> SS
fn to_subset_unchecked(&self) -> SS
self.to_subset but without any property checks. Always succeeds.Source§fn from_subset(element: &SS) -> SP
fn from_subset(element: &SS) -> SP
self to the equivalent element of its superset.