![]() |
Researchers discover SplitSpectre, a new Spectre-like CPU attack - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105) +--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107) +--- Thread: Researchers discover SplitSpectre, a new Spectre-like CPU attack (/showthread.php?tid=4714) |
Researchers discover SplitSpectre, a new Spectre-like CPU attack - silversurfer - 04 December 18 According to the research team, a SplitSpectre attack is far easier to execute than an original Spectre attack. Researchers explain: Quote:Although Spectre v1 is powerful and does not rely on SMT (Simultaneous Multithreading), it requires [...] a gadget to be present in the victim's attack surface. Google Project Zero writes in their original blog post on Spectre v1 [46] that they could not identify such a vulnerable code pattern in the kernel, and instead relied on eBPF (extended Berkeley Packet Filter) to place one there themselves. Quote:In this point lies the strength of our new Spectre v1 variant, SplitSpectre. As its name implies, it splits the Spectre v1gadget into two parts. Source: https://www.zdnet.com/article/researchers-discover-splitspectre-a-new-spectre-like-cpu-attack/ |