Researchers discover SplitSpectre, a new Spectre-like CPU attack
#1
According to the research team, a SplitSpectre attack is far easier to execute than an original Spectre attack. Researchers explain:

Quote:Although Spectre v1 is powerful and does not rely on SMT (Simultaneous Multithreading), it requires [...] a gadget to be present in the victim's attack surface. Google Project Zero writes in their original blog post on Spectre v1 [46] that they could not identify such a vulnerable code pattern in the kernel, and instead relied on eBPF (extended Berkeley Packet Filter) to place one there themselves.
Quote:In this point lies the strength of our new Spectre v1 variant, SplitSpectre. As its name implies, it splits the Spectre v1gadget into two parts.

Source: https://www.zdnet.com/article/researcher...pu-attack/
[-] The following 1 user says Thank You to silversurfer for this post:
  â€˘ harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Malwarebytes 5.2.8.173
Malwarebytes 5.2.8...Mohammad.Poorya — 16:33
Notepad++ v8.7.8 (2025-03-08)
Notepad++ v8.7.8 r...harlan4096 — 16:23
uBOLite_2025.3.8.1350
uBOLite_2025.3.8.1...harlan4096 — 16:22
Privazer 4.0.102
PrivaZer version 4...harlan4096 — 16:20
Microsoft Edge 134.0.3124.51
Version 134.0.3124...harlan4096 — 16:19

[-]
Birthdays
Today's Birthdays
avatar (37)ykazawu
Upcoming Birthdays
avatar (43)gapedDow
avatar (37)snorydar
avatar (42)Hectorvot
avatar (50)knowhanPluts
avatar (38)Williamengiz
avatar (45)qaqapeti
avatar (43)battsourIonix
avatar (42)CedricSek
avatar (38)chasRex
avatar (50)tersfargum
avatar (49)alfreExept
avatar (32)uteluxix
avatar (46)piafcflene
avatar (38)Matthewkah
avatar (37)Charlesfibre
avatar (41)napasvem
avatar (43)diploJeoca
avatar (37)francisnj3
avatar (42)artmaGoork
avatar (40)RichardCisee

[-]
Online Staff
There are no staff members currently online.

>