well written & presented! But, Spectre attacks do NOT cross user/kernel boundaries? Google P0 using eBPF JIT accessed 4GiB region of kernel memory, right?
-
-
-
My understanding is this: eBPF JIT lives in kernel land. So the user/kernel boundary is not crossed by the Spectre attack itself. But rather they leveraged Spectre using code that's already living in kernel space.
- 6 more replies
New conversation -
-
-
I don't know the details and it is too complicated for my vocabulary
-
probably not ebooks, but actual
@thegrugq - 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.