enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  3. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    Transient execution CPU vulnerabilities are vulnerabilities in which instructions, most often optimized using speculative execution, are executed temporarily by a microprocessor, without committing their results due to a misprediction or error, resulting in leaking secret data to an unauthorized party.

  4. Spectre (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Spectre_(security...

    Spectre is one of the two original speculative execution CPU vulnerabilities (the other being Meltdown), which involve microarchitectural side-channel attacks. These affect modern microprocessors that perform branch prediction and other forms of speculation.

  5. Category:Transient execution CPU vulnerabilities - Wikipedia

    en.wikipedia.org/wiki/Category:Transient...

    Pages in category "Transient execution CPU vulnerabilities" ... Meltdown (security vulnerability) Microarchitectural Data Sampling; P. Pacman (security vulnerability) R.

  6. Speculative Store Bypass - Wikipedia

    en.wikipedia.org/wiki/Speculative_Store_Bypass

    Speculative Store Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative execution in a similar way to the Meltdown and Spectre security vulnerabilities. [1] It affects the ARM, AMD and Intel families of processors.

  7. Kernel page-table isolation - Wikipedia

    en.wikipedia.org/wiki/Kernel_page-table_isolation

    In January 2018, the Meltdown vulnerability was published, known to affect Intel's x86 CPUs and ARM Cortex-A75. [22] [23] It was a far more severe vulnerability than the KASLR bypass that KAISER originally intended to fix: It was found that contents of kernel memory could also be leaked, not just the locations of memory mappings, as previously thought.

  8. Side-channel attack - Wikipedia

    en.wikipedia.org/wiki/Side-channel_attack

    In 2017, two CPU vulnerabilities (dubbed Meltdown and Spectre) were discovered, which can use a cache-based side channel to allow an attacker to leak memory contents of other processes and the operating system itself. A timing attack watches data movement into and out of the CPU or memory on the hardware running the cryptosystem or algorithm ...

  9. Project Zero - Wikipedia

    en.wikipedia.org/wiki/Project_Zero

    Project Zero was involved in discovering the Meltdown and Spectre vulnerabilities affecting many modern CPUs, which were discovered in mid-2017 and disclosed in early January 2018. [25] The issue was discovered by Jann Horn independently from the other researchers who reported the security flaw and was scheduled to be published on 9 January ...