ZombieLoad Article Swipe
Related Concepts
Michael Schwarz
,
Moritz Lipp
,
Daniel Moghimi
,
Jo Van Bulck
,
Julian Stecklina
,
Thomas Prescher
,
Daniel Gruss
·
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.1145/3319535.3354252
· OA: W2976763854
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.1145/3319535.3354252
· OA: W2976763854
In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space by exploiting side-effects from transient instructions. While this attack has been mitigated through stronger isolation boundaries between user and kernel space, Meltdown inspired an entirely new class of fault-driven transient-execution attacks. Particularly, over the past year, Meltdown-type attacks have been extended to not only leak data from the L1 cache but also from various other microarchitectural structures, including the FPU register file and store buffer.
Related Topics
Finding more related topics…