Skip to content

Latest commit

 

History

History
22 lines (16 loc) · 1.61 KB

spectre-js.md

File metadata and controls

22 lines (16 loc) · 1.61 KB

Meltdown, Spectre Can Be Exploited Through Your Browser

Tom's Hardware has an article that explain the high level exploit, and there's the official vulnerabilities' website with links to the papers.

..looks so strange to have vulnerabilities with an "official website" and logo..

At the end, these exploits are using a couple of features that all modern browsers provide:

How does it work?

Shared buffers are used to poison the CPU branch prediction logic, and then retrieve the content of the cache. To be able to identify if the data are from the cache or not, a sub-millisecond timer is required.

What are the mitigation steps?

The first line of action it has been to disable, by default, the shared buffers functionality and then to reduce the precision of the High Precision Timers (adding some Jittering).