#1
|
|||
|
|||
New speculative execution micro op vulnerability PoC
Anyone know where we can get a Proof of Concept for the new vulnerability?
The 2018 one is here in C: https://github.com/crozone/SpectrePoC Javascript: https://github.com/google/security-research-pocs/tree/master/spectre.js and demo https://leaky.page Press release from University: https://engineering.virginia.edu/news/2021/04/defenseless Would be really interesting to see the technical details... My suspicion is they pretend to jump to and execute the protected memory region to load it rather than doing indirect addressing. Which makes it surprising it took 3 years more to figure this out. |
The Following User Says Thank You to chants For This Useful Post: | ||
niculaita (05-02-2021) |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Stack execution .. is it blocked on Windows??? | yaa | General Discussion | 5 | 12-03-2007 21:22 |
Basic Disassembler for Delphi port of Micro Length-Disassembler Engine 32 | redbull | General Discussion | 0 | 11-04-2005 04:56 |
Execution protection in WinXP SP2 | nine | General Discussion | 1 | 12-16-2003 04:11 |