On stage today, during the Cyber-ITL talk at ShmooCon, Patrick dropped a little 0day that speculative execution executed data (ignoring non-execute markings). That’s r-x... for those keeping track. (rowhammer for the write anyone?)
-
-
also: "r-x"? don't you mean "rw-"?
-
I think he meant that we have a way to do read and execute with those techniques as in r-x. rwx with rowhammer.
End of conversation
New conversation -
-
-
same question. I spent the past few days wondering if this vulnerability existed and had a pretty conclusive negative result on Kaby Lake and Westmere. Wonder if it's specific to Haswell or something. If not, would love to see what I did wrong
-
Color me sceptic that this attack actually works. Executing data is a front end pipeline issue that is costly in perf if EUs are engaged. No repro on i3-5005u
- 1 more reply
New conversation -
-
-
just tried and could not reproduce it on my machine. would be interesting to know which CPU model this was
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.