Skip to main content

All Questions

0votes
0answers
158views

Secure code makes exploitation easier with CPU vulnerabilities?

I researched CPU vulnerabilities in the past, such as Specter and Meltdown. I read that one of those attacks is made easier if the code is a certain way. I cannot remember if it was related to being ...
user5623335's user avatar
0votes
1answer
284views

Spectre - Code Optimization/Branch Training concept [closed]

Trying to load "a" (lowecase a) speculatively using Spectre. Was hinted here: Spectre PoC - Paper based - opposite results that the problem why it does not load speculatively, could be not ...
dev's user avatar
  • 1,007
0votes
1answer
201views

Spectre PoC - Paper based - opposite results

After long discussion with this Question (Thanks for help!) Spectre Proof of Concept (PoC) Speculative Execution - Checking for value Came up with simple PoC based on Spectre paper. Seems to be ...
dev's user avatar
  • 1,007
3votes
1answer
851views

Spectre Proof of Concept (PoC) Speculative Execution - Checking for value

Inspired by this question and based on this: Why does me unpatched sytsem *appear* to be not vulenrable by Spectre? Figured out I will open a new question, instead of "polluting" somebody else ...
dev's user avatar
  • 1,007
2votes
1answer
347views

Spectre: Problem with Understanding POC - Reading data from cache

I understand the vulnerability (Spectre) and, in theory, what the PoC does. But I do not understand the part of the PoC, when it reads or identifys the data from the cache, between the lines 86 - 108. ...
user104787's user avatar

close