Zephyrnet Logo

Tag: speculative execution

‘GhostRace’ Speculative Execution Attack Impacts All CPU, OS Vendors

Researchers at IBM and VU Amsterdam have developed a new attack that exploits speculative execution mechanisms in modern computer processors to bypass checks in...

Top News

Sweeping Changes For Leading-Edge Chip Architectures

Chipmakers are utilizing both evolutionary and revolutionary technologies to achieve orders of magnitude improvements in performance at the same or lower power, signaling a...

Zenbleed: How the quest for CPU performance could put your passwords at risk

by Paul Ducklin Remember Heartbleed? That was the bug, back in 2014, that introduced the suffix -bleed for vulnerabilities that leak...

The Potential Risks of Zenbleed: Exploring the Impact of CPU Performance on Password Security

In recent years, the world has witnessed a surge in cyber threats and attacks. As a result, individuals and organizations have become increasingly concerned...

Holistic Power Reduction

The power consumption of a device is influenced by every stage of the design, development, and implementation process, but identifying opportunities to save power...

Formal Processor Model Providing Secure Speculation For The Constant-Time Policy

A technical paper titled “ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)” was published by researchers at imec-DistriNet at KU Leuven, CEA,...

Validating NoC Security. Innovation in Verification

Network on Chip (NoC) connectivity is ubiquitous in SoCs, therefore should be an attractive attack vector. Is it possible to prove robustness against a...

New Exploit Bypasses Existing Spectre-v2 Mitigations in Intel, AMD, Arm CPUs

Researchers have disclosed a new technique that could be used to circumvent existing hardware mitigations in modern processors from Intel, AMD, and Arm and stage speculative execution attacks such as Spectre to leak sensitive information from host memory. Attacks like Spectre are designed to break the isolation between different applications by taking advantage of an optimization technique 

SFX house Weta goes into the SaaS business with cloudy pipeline and its in-house animation tools

The mitigations applied to exorcise Spectre, the family of data-leaking processor vulnerabilities, from computers hinders performance enough that disabling protection for the sake...

Google: This Spectre proof-of-concept shows how dangerous these attacks can be

Google has released a proof of concept (PoC) code to demonstrate the practicality of Spectre side-channel attacks against a browser's JavaScript engine to...

It’s No Secret: Why Xilinx Joined the Confidential Computing Consortium

 We’re excited to announce that Xilinx recently joined the Confidential Computing Consortium (CCC) to help drive the effort to extend Confidential Computing into accelerators...

RIP: NetApp Advanced Technology Group shuffles off this mortal coil

NetApp has confirmed it is closing down the standalone Advanced Technology Group (ATG) – an incubation unit that was part of the office...

This Week in Security: Crosstalk, TLS Resumption, And Brave Shenanigans

Intel announced CrossTalk, a new side-channel attack that can leak data from CPU buffers. It’s the same story we’ve heard before. Bits of...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?