Meltdown-US / Meltdown 3a Remaining Leakage

Meltdown-US / Meltdown 3a Remaining Leakage

Open Source Security 

Posted by Daniel Weber on Oct 06


we analyzed the remaining leakage of the „original“ Meltdown attack
(Meltdown-US) (1) and the variant Meltdown 3a (2). We discovered that
the „original“ Meltdown attack can be abused to infer the cache state of
memory pages that remain mapped despite KPTI. This allows an attacker to
monitor interrupt activity.
Furthermore, Meltdown 3a can still leak the content of privileged system
registers, such as the FS/GS…
 Read More 

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert