Tags: Spectre

NetSpectre Attack Could Enable Remote CPU Exploitation

Researchers from Graz University in Austria released new research on July 26 detailing how the Spectre CPU speculative execution vulnerability could be used over a remote network. In a 14-page report, the researchers dubbed their attack method NetSpectre, which can enable an attacker to read...
Read 0 Comments

​The Return of Spectre

The return of Spectre sounds like the next James Bond movie, but it's really the discovery of two new Spectre-style CPU attacks. Vladimir Kiriansky, a Ph.D. candidate at MIT, and independent researcher Carl Waldspurger found the latest two security holes. They have since published a MIT paper, ...
Read 0 Comments

KPTI/KAISER Meltdown Initial Performance Regressions

The recently revealed Meltdown and Spectre bugs are not just extraordinary issues of security, but also performance. The patches that workaround Meltdown introduce the largest kernel performance regressions I've ever seen. Many thanks to the engineers working hard to develop workarounds to these...
Read 0 Comments

How to Minimize the Meltdown Patch Performance Penalty

The saga of the cross-industry side-channel attack (Meltdown and Spectre) is not yet over. Turmoil continues as CPU vendors release new microcode and recall previous ones. To understand the extent of the work that still needs to be done, consider the language Linus Torvalds usesabout the patches...
Read 0 Comments

​Linux and Intel Slowly Hack Their Way to a Spectre Patch

Spectre and Meltdown are major design flaws in modern CPUs. While they're present in almost all recent processors, because Intel chips are so widely used, Intel is taking most of the heat for these bugs. Nowhere has the criticism been hotter than on the Linux Kernel Mailing List (LKML). That's...
Read 0 Comments

What You Need to Know About the Meltdown and Spectre CPU Flaws

The computer industry is racing to deal with several new vulnerabilities that affect the majority of processors in modern computers and mobile devices. The flaws enable new attacks that break the critical memory defenses in operating systems and bypass fundamental isolation layers, including those...
Read 0 Comments
Click Here!