04 December 18, 14:55
(This post was last modified: 04 December 18, 14:56 by silversurfer.)
According to the research team, a SplitSpectre attack is far easier to execute than an original Spectre attack. Researchers explain:
Source: https://www.zdnet.com/article/researcher...pu-attack/
Quote:Although Spectre v1 is powerful and does not rely on SMT (Simultaneous Multithreading), it requires [...] a gadget to be present in the victim's attack surface. Google Project Zero writes in their original blog post on Spectre v1 [46] that they could not identify such a vulnerable code pattern in the kernel, and instead relied on eBPF (extended Berkeley Packet Filter) to place one there themselves.
Quote:In this point lies the strength of our new Spectre v1 variant, SplitSpectre. As its name implies, it splits the Spectre v1gadget into two parts.
Source: https://www.zdnet.com/article/researcher...pu-attack/