<s>
Hertzbleed	B-Device
is	O
a	O
hardware	O
security	O
attack	O
which	O
describes	O
exploiting	O
dynamic	B-General_Concept
frequency	I-General_Concept
scaling	I-General_Concept
to	O
reveal	O
secret	O
data	O
.	O
</s>
<s>
Hertzbleed	B-Device
is	O
more	O
dangerous	O
than	O
power	O
analysis	O
,	O
as	O
it	O
can	O
be	O
exploited	O
by	O
a	O
remote	O
attacker	O
.	O
</s>
<s>
Disclosure	O
of	O
cryptographic	B-Application
keys	I-Application
is	O
the	O
main	O
concern	O
regarding	O
the	O
exploit	O
.	O
</s>
<s>
Neither	O
Intel	O
nor	O
AMD	O
are	O
planning	O
to	O
release	O
microcode	B-Device
patches	O
,	O
instead	O
advising	O
to	O
harden	O
cryptography	O
libraries	O
against	O
the	O
vulnerability	O
.	O
</s>
<s>
Hertzbleed	B-Device
combines	O
a	O
timing	O
attack	O
with	O
a	O
power	O
analysis	O
attack	O
.	O
</s>
<s>
Hertzbleed	B-Device
exploits	O
execution	O
time	O
differences	O
caused	O
by	O
dynamic	B-General_Concept
frequency	I-General_Concept
scaling	I-General_Concept
,	O
a	O
CPU	O
feature	O
which	O
changes	O
the	O
processor	O
's	O
frequency	O
to	O
maintain	O
power	O
consumption	O
and	O
temperature	O
constraints	O
.	O
</s>
<s>
Hertzbleed	B-Device
thus	O
effectively	O
bypasses	O
constant-time	O
programming	O
,	O
which	O
does	O
not	O
take	O
into	O
account	O
changes	O
in	O
processor	O
frequency	O
.	O
</s>
