DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!
   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
July 4, 2020 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 94 people online.

 

Latest Reviews
Ewin Racing Flash gaming chair
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
 

Follow us
RSS
 

SpectreRSB is yet another CPU side-channel attack

Posted on Tuesday, July 24 2018 @ 11:39:33 CEST by


Researchers from University of California, Riverside (UCR) discovered another Spectre-class attack. Called SpectreRSB, this attack abuses the speculative execution feature that's used by all modern processors. In particular, the new strain recovers data belonging to other processes from the Return Stack Buffer (RSB), and can even be used to spill SGX secrets.

SpectreRSB not only affects Intel, AMD, and ARM processors, but also bypasses all mitigations that were rolled out for Spectre and Meltdown.
The difference from previous Spectre-like attacks is that SpectreRSB recovers data from the speculative execution process by attacking a different CPU component involved in this "speculation" routine, namely the Return Stack Buffer (RSB). Previous Spectre attacks have targeted the branch predictor unit or parts of the CPU cache.

In the grand architecture of a CPU, the RSB is a component that is involved in the speculative execution routine and works by predicting the return address of an operation the CPU is trying to compute in advance, part of its "speculation."
More details at Bleeping Computer.



 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2019 DM Media Group bvba