Rezultati pretraživanja
  1. 28. srp 2018.

    Wondered why there is no CVE for ? Intel believes the old CVEs still apply for because they think " is a local attack". See for a description of "local attack": "A vulnerability exploitable with Local access means that

    Prikaži ovu nit
  2. The slides I will present at today’s Keynote on (aka ) and similar microprocessor microarchitecture vulnerabilities are now online. Simple as 1,2,3 (aka 123 slides in 1 hour):

  3. 30. ožu 2019.
  4. 27. srp 2018.

    "Although the attack is innovative, also has its downsides. The biggest is the attack's woefully slow exfiltration speed, which is 15 bits/hour for attacks carried out via a network connection and targeting data stored in the CPU's cache."

  5. 7. kol 2018.

    Intel just gave me permission to release the blog on the Clock Speed Throttle . So as promised, here it is - the way I intended to publish it back in June before was announced:

    Prikaži ovu nit
  6. Odgovor korisniku/ci

    👍😂 is it wrong I think is sexier than the other variants? 🤔

  7. 27. srp 2018.

    Here is an excellent analysis of : Really like the analysis, both of where it *does* matter, and where it matters less.

  8. 3. kol 2018.

    Forget and welcome by which an attacker can bombard the computer network ports to get the desired results.

  9. 27. srp 2018.

    Do you have questions about ? Check out our article on the Customer Portal:

  10. 20. tra 2019.
  11. 10. tra 2019.

    Verdict was always Reject with the reason along the lines of "As long as there's no gadget found exploitable in the wild in off-the-shelf software, this is a purely academic attack and we will reject it." (not a literal quote from reviews of course)

    Prikaži ovu nit
  12. 27. srp 2018.
  13. Tomorrow will be even more slides (over 100 in an hour) and cover all disclosed variants of (and more) with how they work. Make sure you have coffee before you come.

  14. 27. srp 2018.

    I’m going to throw it out there and say I’m impressed by the research. Even if it is the slowest way ever to steal something..

  15. 26. srp 2018.

    "We demonstrate that using previously ignored gadgets allows breaking address-space layout randomization in a remote attack. Address-space layout randomization (ASLR)" 🤯👏

  16. 26. srp 2018.

    Example workflow of Attack

    Prikaži ovu nit
  17. 26. srp 2018.

    I expect the name to be all over the news tomorrow. Reading arbitrary memory over the network:

  18. Attack Could Enable Remote Exploitation

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.