Follow

" from 2011 to 2019 vulnerable to two new attacks"

zdnet.com/article/amd-processo

"With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical ."

mlq.me/download/takeaway.pdf

Sign in to participate in the conversation
Mastodon

mastodon.f-si.org is one server in the network