When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Transient execution CPU vulnerability - Wikipedia

    en.wikipedia.org/wiki/Transient_execution_CPU...

    The archetype is Spectre, and transient execution attacks like Spectre belong to the cache-attack category, one of several categories of side-channel attacks. Since January 2018 many different cache-attack vulnerabilities have been identified.

  3. Spectre (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Spectre_(security...

    In 2002 and 2003, Yukiyasu Tsunoo and colleagues from NEC showed how to attack MISTY and DES symmetric key ciphers, respectively. In 2005, Daniel Bernstein from the University of Illinois, Chicago reported an extraction of an OpenSSL AES key via a cache timing attack, and Colin Percival had a working attack on the OpenSSL RSA key using the Intel processor's cache.

  4. Speculative Store Bypass - Wikipedia

    en.wikipedia.org/wiki/Speculative_Store_Bypass

    SSB is named Variant 4, but it is the fifth variant in the Spectre-Meltdown class of vulnerabilities. [7] Steps involved in exploit: [1] "Slowly" store a value at a memory location "Quickly" load that value from that memory location; Utilize the value that was just read to disrupt the cache in a detectable way

  5. Timing attack - Wikipedia

    en.wikipedia.org/wiki/Timing_attack

    The graph on the left denotes a case where the timing attack is successfully able to detect a cached image whereas the one on the right is unable to do the same. In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms ...

  6. Side-channel attack - Wikipedia

    en.wikipedia.org/wiki/Side-channel_attack

    A cache side-channel attack works by monitoring security critical operations such as AES T-table entry [2] [3] [4] or modular exponentiation or multiplication or memory accesses. [5] The attacker then is able to recover the secret key depending on the accesses made (or not made) by the victim, deducing the encryption key.

  7. Retbleed - Wikipedia

    en.wikipedia.org/wiki/Retbleed

    Retbleed is a speculative execution attack on x86-64 and ARM processors, including some recent Intel and AMD chips. [ 1 ] [ 2 ] First made public in 2022, it is a variant of the Spectre vulnerability which exploits retpoline , which was a mitigation for speculative execution attacks.

  8. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  9. Downfall (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Downfall_(security...

    Downfall, known as Gather Data Sampling (GDS) by Intel, [1] is a computer security vulnerability found in 6th through 11th generations of consumer and 1st through 4th generations of Xeon Intel x86-64 microprocessors. [2]