Researchers discover SplitSpectre, a new Spectre-like CPU attack
#1
According to the research team, a SplitSpectre attack is far easier to execute than an original Spectre attack. Researchers explain:

Quote:Although Spectre v1 is powerful and does not rely on SMT (Simultaneous Multithreading), it requires [...] a gadget to be present in the victim's attack surface. Google Project Zero writes in their original blog post on Spectre v1 [46] that they could not identify such a vulnerable code pattern in the kernel, and instead relied on eBPF (extended Berkeley Packet Filter) to place one there themselves.
Quote:In this point lies the strength of our new Spectre v1 variant, SplitSpectre. As its name implies, it splits the Spectre v1gadget into two parts.

Source: https://www.zdnet.com/article/researcher...pu-attack/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 11:46
DCRat backdoor returns
Since the beginnin...harlan4096 — 11:30
Mozilla Firefox Browser 136.0.1
Mozilla Firefox Br...harlan4096 — 10:28
Google Chrome 134.0.6998.88/.89
Google Chrome 134....harlan4096 — 10:18
Vivaldi 7.1 Build 3570.60
Vivaldi 7.1 Build ...harlan4096 — 10:16

[-]
Birthdays
Today's Birthdays
avatar (41)napasvem
avatar (43)diploJeoca
Upcoming Birthdays
avatar (43)gapedDow
avatar (37)snorydar
avatar (42)Hectorvot
avatar (50)knowhanPluts
avatar (38)Williamengiz
avatar (45)qaqapeti
avatar (43)battsourIonix
avatar (42)CedricSek
avatar (38)chasRex
avatar (50)tersfargum
avatar (49)alfreExept
avatar (32)uteluxix
avatar (46)piafcflene
avatar (38)Matthewkah
avatar (37)Charlesfibre
avatar (37)francisnj3
avatar (42)artmaGoork
avatar (40)RichardCisee

[-]
Online Staff
There are no staff members currently online.

>