mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

737
active users

#speculativeexecution

0 posts0 participants0 posts today
IT News<p>This Week in Security: DeepSeek’s Oopsie, AI Tarpits, And Apple’s Leaks - DeepSeek has captured the world’s attention this week, with an unexpected release ... - <a href="https://hackaday.com/2025/01/31/this-week-in-security-deepseeks-oopsie-ai-tarpits-and-apples-leaks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/01/31/this-w</span><span class="invisible">eek-in-security-deepseeks-oopsie-ai-tarpits-and-apples-leaks/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/deepseek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deepseek</span></a> <a href="https://schleuss.online/tags/tarpits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tarpits</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Richi Jennings<p>Want more <a href="https://vmst.io/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> bugs? “You’re gonna be in a great mood all day.”</p><p><a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a>’s latest three generations of <a href="https://vmst.io/tags/ARM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARM</span></a> ISA chips have a pair of <a href="https://vmst.io/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a>-like vulnerabilities. But, unlike other <a href="https://vmst.io/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> flaws, this one seems like the real deal: It could actually be exploited to steal your private info. “Four or five seconds—it’s done!”</p><p><a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a>’s known about at least one of the bugs for TEN months. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we wonder why Tim’s crew did nothing about it. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/01/slap-flop-apple-silicon-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/01/</span><span class="invisible">slap-flop-apple-silicon-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a> $AAPL</p>
IT News<p>Apple chips can be hacked to leak secrets from Gmail, iCloud, and more - Apple-designed chips powering Macs, iPhones, and iPads contain two newly d... - <a href="https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/a" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>a</span></a>-serieschips <a href="https://schleuss.online/tags/m" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>m</span></a>-serieschips <a href="https://schleuss.online/tags/sidechannels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sidechannels</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a></p>
aegilops :github::microsoft:<p>Speculative execution and other microarchitectural attacks never went away, and the research just keeps getting smarter.</p><p>Pathfinder introduces new tools and two new types of speculative execution, affecting Intel and AMD CPUs.</p><p><a href="https://fosstodon.org/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://fosstodon.org/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> <a href="https://fosstodon.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://fosstodon.org/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> <a href="https://fosstodon.org/tags/VU157097" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VU157097</span></a></p><p><a href="https://pathfinder.cpusec.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pathfinder.cpusec.org/</span><span class="invisible"></span></a></p>
cynicalsecurity :cm_2:<p>You might by now have heard of "Downfall"¹, yet another speculative execution attack on Intel processors.</p><p>The mitigations are going to cost another 50% performance on "selected workloads" which, by Murphy's, will inevitably be yours.</p><p>I quote something I find really rather irritating:</p><p>"<br>[Q] Can I disable the mitigation if my workload does not use Gather?</p><p>[A] This is a bad idea. Even if your workload does not use vector instructions, modern CPUs rely on vector registers to optimize common operations, such as copying memory and switching register content, which leaks data to untrusted code exploiting Gather.<br>"</p><p>No, you can freely decide to ignore microcode mitigations if you know what you are doing. There are thousands of reasons why you should not continue piling up Intel's microcode fixes on your machines and performance is indeed one of them.</p><p>This attack is based on the "gather" part of the "scatter-gather" SIMD algorithms, these are pretty ubiquitous if you have ever done HPC and, well, if your HPC machine is one telnet away from the Internet then you have a bigger problem than microcode².</p><p>Now, please understand, perhaps "for once and for all", that these attacks have a very simple "root cause": in the 1990s pretty much every processor manufacturer on the planet decided that performance trumped everything else and, therefore, went down (unprotected) speculative execution³. </p><p>This means that it cannot be fixed within current architectures.</p><p><a href="https://bsd.network/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> <a href="https://bsd.network/tags/NamedVulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NamedVulnerabilities</span></a> <a href="https://bsd.network/tags/Downfall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Downfall</span></a> <a href="https://bsd.network/tags/Hype" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hype</span></a> <a href="https://bsd.network/tags/MitigationsDoneWrong" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MitigationsDoneWrong</span></a></p><p>__<br>¹ <a href="https://downfall.page" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">downfall.page</span><span class="invisible"></span></a><br>² I used to manage an HPC network in the 1990s, I was hacked by, of all places, Intel in Israel (Haifa), no I cannot discuss this further, yes, I detected them.<br>³ If you read the literature you will discover that even IBM mainframe processors went down that route (hint, hint).</p>
deltatux :donor:<p><span>During this year's </span><a href="https://infosec.town/tags/BlackHat" rel="nofollow noopener noreferrer" target="_blank">#BlackHat</a><span> conference, security researcher Daniel Moghimi is set to present "Downfall", a new speculative execution vulnerability found in Intel processors from 2014-2023.<br><br>This new speculative execution vulnerability if exploited could allow attackers steal encryption keys &amp; passwords.<br><br>Intel noted that they haven't seen this vulnerability being exploited in the wild and that detection is difficult.<br><br>Moghimi stated that exploiting was relatively easy, he goes on to say:</span></p><blockquote><span>When I discovered this vulnerability, it took me maybe a couple of weeks to come up with attacks that work. I was just a one-person researcher without any resources, you can imagine if you have a team of black hat hackers, you can probably do a lot more with it.</span></blockquote><span>While the flaw exists in hardware, Intel has provided microcode updates &amp; the </span><a href="https://infosec.town/tags/Linux" rel="nofollow noopener noreferrer" target="_blank">#Linux</a><span> kernel maintainers have published mitigations for this flaw in today's kernel release.<br><br></span><a href="https://infosec.town/tags/infosec" rel="nofollow noopener noreferrer" target="_blank">#infosec</a><span> </span><a href="https://infosec.town/tags/cybersecurity" rel="nofollow noopener noreferrer" target="_blank">#cybersecurity</a><span> </span><a href="https://infosec.town/tags/DOWNFALL" rel="nofollow noopener noreferrer" target="_blank">#DOWNFALL</a><span> </span><a href="https://infosec.town/tags/speculativeexecution" rel="nofollow noopener noreferrer" target="_blank">#speculativeexecution</a><span> </span><a href="https://infosec.town/tags/Intel" rel="nofollow noopener noreferrer" target="_blank">#Intel</a><span> </span><a href="https://infosec.town/tags/CPUBug" rel="nofollow noopener noreferrer" target="_blank">#CPUBug</a><span><br><br>- </span><a href="https://cyberscoop.com/downfall-intel-cpu-vulnerability/" rel="nofollow noopener noreferrer" target="_blank">https://cyberscoop.com/downfall-intel-cpu-vulnerability/</a><span><br>- </span><a href="https://www.bleepingcomputer.com/news/security/new-downfall-attacks-on-intel-cpus-steal-encryption-keys-data/" rel="nofollow noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/new-downfall-attacks-on-intel-cpus-steal-encryption-keys-data/</a><p></p>
cynicalsecurity :cm_2:<p>Quite a long list this time spanning sophisticated semiconductor properties (generating electricity from heat), some "cyberspace" legal arguments, an interesting attack against automatic speaker verification, a design "fixing" speculative execution¹, a family of low-latency ciphers, randomness in Cisco ASA (yes!), anonymising stories with privacy guarantees (thought-provoking for sure), ChatGPT fun, malicious IPFS, and a little something about the perception of privacy (also thought-provoking).</p><p>Here's the shortlist: </p><p>* "Semiconductor Thermal and Electrical Properties Decoupled by Localized Phonon Resonances"<br>* "On-chip wavelength division multiplexing filters using extremely efficient gate-driven silicon microring resonator array"<br>* "Space Cybersecurity Norms"<br>* "Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems"<br>* "SafeBet: Secure, Simple, and Fast Speculative Execution"<br>* "Introducing two Low-Latency Cipher Families: Sonic and SuperSonic"<br>* "Randomness of random in Cisco ASA"<br>* "What If Alice Wants Her Story Told?"<br>* "Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT"<br>* "What's inside a node? Malicious IPFS nodes under the magnifying glass"<br>* ""My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies"</p><p><a href="https://bsd.network/tags/Photonics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Photonics</span></a> <a href="https://bsd.network/tags/SemiconductorEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SemiconductorEngineering</span></a> <a href="https://bsd.network/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://bsd.network/tags/AdversarialConvolutiveAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AdversarialConvolutiveAttacks</span></a> <a href="https://bsd.network/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> <a href="https://bsd.network/tags/LowLatencyCiphers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LowLatencyCiphers</span></a> <a href="https://bsd.network/tags/Randomness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Randomness</span></a> <a href="https://bsd.network/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://bsd.network/tags/Anonymity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anonymity</span></a> <a href="https://bsd.network/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a> <a href="https://bsd.network/tags/IPFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPFS</span></a></p><p>__<br>¹ to me it is just memory tagging "done wrong" but I am putting it forward just in case it is my unconscious bias talking.</p>
cynicalsecurity :cm_2:<p>The time has come to talk of many things… today's selection is again quite varied covering topics from ChatGPT security to CHERI allocators via near-ultrasound attacks on Alexa, issues with Signal groups and a fascinating "automatic repair" for speculative execution attacks with a smattering of Belgian remote voting!</p><p>* "Beyond the Safeguards: Exploring the Security Risks of ChatGPT"<br>* "DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack"<br>* "ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems"<br>* "Picking a CHERI Allocator: Security and Performance Considerations"<br>* "Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System"<br>* "Comprehensively Analyzing the Impact of Cyberattacks on Power Grids"<br>* "NUANCE: Near Ultrasound Attack On Networked Communication Environments"<br>* "Automatic and Incremental Repair for Speculative Information Leaks"<br>* "Poster: No safety in numbers: traffic analysis of sealed-sender groups in Signal"</p><p><a href="https://bsd.network/tags/arXiv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arXiv</span></a> <a href="https://bsd.network/tags/ResearchPapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ResearchPapers</span></a> <a href="https://bsd.network/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a> <a href="https://bsd.network/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> <a href="https://bsd.network/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> <a href="https://bsd.network/tags/Alexa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Alexa</span></a> <a href="https://bsd.network/tags/PowerGrids" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerGrids</span></a> <a href="https://bsd.network/tags/CHERI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CHERI</span></a> <a href="https://bsd.network/tags/DNN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNN</span></a> <a href="https://bsd.network/tags/BelgiumRemoteVoting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BelgiumRemoteVoting</span></a></p>
IT News<p>This Week in Security: Session Puzzling, Session Keys, and Speculation - Last week we briefly mentioned a vulnerability in the Papercut software, and more ... - <a href="https://hackaday.com/2023/04/28/this-week-in-security-session-puzzling-session-keys-and-speculation/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/04/28/this-w</span><span class="invisible">eek-in-security-session-puzzling-session-keys-and-speculation/</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://schleuss.online/tags/rdp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rdp</span></a></p>
cynicalsecurity :cm_2:<p>G. Hu and R. Lee, "Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks"¹ </p><p>Cache side-channel attacks and speculative execution attacks that leak information through cache states are stealthy and dangerous attacks on hardware that must be mitigated. Unfortunately, defenses proposed for cache side-channel attacks do not mitigate all cache-based speculative execution attacks and vice versa. Since both classes of attacks must be addressed, we propose comprehensive cache architectures to do this. <br>We show a framework to analyze the security of a secure cache. We identify same-domain speculative execution attacks, and show they evade cache side-channel defenses. We present new hardware security mechanisms that address target attacks and reduce performance overhead. We design two Speculative and Timing Attack Resilient (STAR) caches that defeat both cache side-channel attacks and cache-based speculative execution attacks. These comprehensive defenses have low performance overhead of 6.6% and 8.8%.</p><p><a href="https://bsd.network/tags/arXiv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arXiv</span></a> <a href="https://bsd.network/tags/ResearchPapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ResearchPapers</span></a> <a href="https://bsd.network/tags/SideChannelAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SideChannelAttacks</span></a> <a href="https://bsd.network/tags/Microarchitecture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microarchitecture</span></a> <a href="https://bsd.network/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a><br>__<br>¹ <a href="https://arxiv.org/abs/2302.00732" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2302.00732</span><span class="invisible"></span></a></p>
cynicalsecurity :cm_2:<p>For those interested in the number of ways Intel's SGX has been broken there is now a fine site:</p><p><a href="https://sgx.fail" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">sgx.fail</span><span class="invisible"></span></a></p><p>The introduction to the site reads:</p><p>Intel's Software Guard Extension (SGX) promises an isolated execution environment, protected from all software running on the machine. In the past few years, however, SGX has come under heavy fire, threatened by numerous side channel attacks. With Intel repeatedly patching SGX to regain security, we set out to explore the effectiveness of SGX's update mechanisms to prevent attacks on real-world deployments.</p><p>More specifically, we survey and categorize various SGX attacks, their applicability to different SGX architectures, as well as the information they leak. We then explored the effectiveness of SGX's update mechanisms in preventing attacks on two real-word deployments, the SECRET network and PowerDVD. In both cases, we show that these vendors are unable to meet the security goals originally envisioned for their products, presumably due to SGX's long update timelines and the complexities of a manual update process. This forces vendors to make a difficult security vs. usability trade off, resulting in security compromises.</p><p><a href="https://bsd.network/tags/SGX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SGX</span></a> <a href="https://bsd.network/tags/TrustedEnclaves" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrustedEnclaves</span></a> <a href="https://bsd.network/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> <a href="https://bsd.network/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://bsd.network/tags/PowerDVD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerDVD</span></a> #</p>
cynicalsecurity :cm_2:<p>H. Xiao and S. Ainsworth, "Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers"¹</p><p>Side-channel attacks pose serious threats to many security models, especially sandbox-based browsers. While transient-execution side channels in out-of-order processors have previously been blamed for vulnerabilities such as Spectre and Meltdown, we show that in fact, the capability of out-of-order execution itself to cause mayhem is far more general. <br>We develop Hacky Racers, a new type of timing gadget that uses instruction-level parallelism, another key feature of out-of-order execution, to measure arbitrary fine-grained timing differences, even in the presence of highly restricted JavaScript sandbox environments. While such environments try to mitigate timing side channels by reducing timer precision and removing language features such as SharedArrayBuffer that can be used to indirectly generate timers via thread-level parallelism, no such restrictions can be designed to limit Hacky Racers. We also design versions of Hacky Racers that require no misspeculation whatsoever, demonstrating that transient execution is not the only threat to security from modern microarchitectural performance optimization. <br>We use Hacky Racers to construct novel backwards-in-time Spectre gadgets, which break many hardware countermeasures in the literature by leaking secrets before misspeculation is discovered. We also use them to generate the first known last-level cache eviction set generator in JavaScript that does not require SharedArrayBuffer support.</p><p><a href="https://bsd.network/tags/arXiv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arXiv</span></a> <a href="https://bsd.network/tags/ResearchPapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ResearchPapers</span></a> <a href="https://bsd.network/tags/OutOfOrderExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OutOfOrderExecution</span></a> <a href="https://bsd.network/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a> <a href="https://bsd.network/tags/Meltdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meltdown</span></a> <a href="https://bsd.network/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a></p><p>__<br>¹ <a href="https://arxiv.org/abs/2211.14647" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2211.14647</span><span class="invisible"></span></a></p>
IT News<p>New working speculative execution attack sends Intel and AMD scrambling - Enlarge </p><p>Some microprocessors from Intel and AMD are vulnerabl... - <a href="https://arstechnica.com/?p=1865795" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1865795</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intel</span></a> <a href="https://schleuss.online/tags/cpus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cpus</span></a> <a href="https://schleuss.online/tags/amd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amd</span></a></p>
IT News<p>New Spectre attack once again sends Intel and AMD scrambling for a fix - Enlarge (credit: Intel) <br>Since 2018, an almost endless series of attacks broadly... - <a href="https://arstechnica.com/?p=1762393" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1762393</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/centralprocessingunit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>centralprocessingunit</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectre</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://schleuss.online/tags/cpus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cpus</span></a></p>
IT News<p>Undocumented x86 Instructions Allow Microcode Access - For an old CPU, finding all the valid instructions wasn’t very hard. You simply tried them all. Sure... - <a href="https://hackaday.com/2021/03/26/undocumented-x86-instructions-allow-microcode-access/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2021/03/26/undocu</span><span class="invisible">mented-x86-instructions-allow-microcode-access/</span></a> <a href="https://schleuss.online/tags/undocumentedinstructions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>undocumentedinstructions</span></a> <a href="https://schleuss.online/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://schleuss.online/tags/computerhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computerhacks</span></a> <a href="https://schleuss.online/tags/softwarehacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarehacks</span></a> <a href="https://schleuss.online/tags/microcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microcode</span></a> <a href="https://schleuss.online/tags/x86" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x86</span></a></p>
Dr. Roy Schestowitz (罗伊)<a class="hashtag" href="https://pleroma.site/tag/security" rel="nofollow noopener noreferrer" target="_blank">#Security</a> Holes: <a class="hashtag" href="https://pleroma.site/tag/speculativeexecution" rel="nofollow noopener noreferrer" target="_blank">#SpeculativeExecution</a> Mitigation, <a class="hashtag" href="https://pleroma.site/tag/crosstalk" rel="nofollow noopener noreferrer" target="_blank">#CrossTalk</a> / <a class="hashtag" href="https://pleroma.site/tag/srbds" rel="nofollow noopener noreferrer" target="_blank">#SRBDS</a> and More <a href="http://www.tuxmachines.org/node/138580" rel="nofollow noopener noreferrer" target="_blank">http://www.tuxmachines.org/node/138580</a>
ClaudioM<p>Alright sir.... 😕 <a href="https://mastodon.xyz/tags/linux" class="mention hashtag" rel="tag">#<span>linux</span></a> <a href="https://mastodon.xyz/tags/speculativeexecution" class="mention hashtag" rel="tag">#<span>speculativeexecution</span></a> <a href="https://mastodon.xyz/tags/mitigations" class="mention hashtag" rel="tag">#<span>mitigations</span></a></p><p><a href="https://make-linux-fast-again.com/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">make-linux-fast-again.com/</span><span class="invisible"></span></a></p>
Semi news bot of the Fedi<p>Install updates now to address a vulnerability in most Intel CPUs <a href="https://www.engadget.com/2019/05/15/intel-mds-exploit/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">engadget.com/2019/05/15/intel-</span><span class="invisible">mds-exploit/</span></a> <a href="https://mstdn.foxfam.club/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://mstdn.foxfam.club/tags/personalcomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>personalcomputing</span></a> <a href="https://mstdn.foxfam.club/tags/personalcomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>personalcomputing</span></a> <a href="https://mstdn.foxfam.club/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mstdn.foxfam.club/tags/zombieload" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zombieload</span></a> <a href="https://mstdn.foxfam.club/tags/meltdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meltdown</span></a> <a href="https://mstdn.foxfam.club/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mstdn.foxfam.club/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mstdn.foxfam.club/tags/fallout" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fallout</span></a> <a href="https://mstdn.foxfam.club/tags/spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectre</span></a> <a href="https://mstdn.foxfam.club/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a> <a href="https://mstdn.foxfam.club/tags/intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intel</span></a> <a href="https://mstdn.foxfam.club/tags/patch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patch</span></a> <a href="https://mstdn.foxfam.club/tags/gear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gear</span></a> <a href="https://mstdn.foxfam.club/tags/ridl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ridl</span></a> <a href="https://mstdn.foxfam.club/tags/mds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mds</span></a></p>
Semi news bot of the Fedi<p>New speculative execution bug leaks data from Intel chips’ internal buffers <a href="https://arstechnica.com/?p=1504973" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1504973</span><span class="invisible"></span></a> <a href="https://mstdn.foxfam.club/tags/speculativeexecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>speculativeexecution</span></a> <a href="https://mstdn.foxfam.club/tags/meltdown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meltdown</span></a> <a href="https://mstdn.foxfam.club/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mstdn.foxfam.club/tags/spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectre</span></a> <a href="https://mstdn.foxfam.club/tags/intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://mstdn.foxfam.club/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
Bob JonkmanThat also gives a good explanation of modern chip architecture: #<span class=""><a href="https://gs.jonkman.ca/tag/pipelining" rel="nofollow noopener noreferrer" target="_blank">Pipelining</a></span>, #<span class=""><a href="https://gs.jonkman.ca/tag/scalar" rel="nofollow noopener noreferrer" target="_blank">Scalar</a></span> vs. #<span class=""><a href="https://gs.jonkman.ca/tag/nonscalar" rel="nofollow noopener noreferrer" target="_blank">NonScalar</a></span>, OutOfOrderProcessing, #<span class=""><a href="https://gs.jonkman.ca/tag/speculativeexecution" rel="nofollow noopener noreferrer" target="_blank">SpeculativeExecution.</a></span> #<span class=""><a href="https://gs.jonkman.ca/tag/spectre" rel="nofollow noopener noreferrer" target="_blank">Spectre</a></span> #<span class=""><a href="https://gs.jonkman.ca/tag/meltdown" rel="nofollow noopener noreferrer" target="_blank">Meltdown</a></span> #<span class=""><a href="https://gs.jonkman.ca/tag/security" rel="nofollow noopener noreferrer" target="_blank">Security</a></span>