Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Spectre Attacks: Exploiting Speculative Execution #6

Open
stefan2904 opened this issue Jan 10, 2018 · 0 comments
Open

Spectre Attacks: Exploiting Speculative Execution #6

stefan2904 opened this issue Jan 10, 2018 · 0 comments
Labels

Comments

@stefan2904
Copy link
Collaborator

Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre

Spectre is harder to exploit than Meltdown, but it is also harder to mitigate. However, it is possible to prevent specific known exploits based on Spectre through software patches.

https://spectreattack.com/spectre.pdf

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant