https://www.tomshardware.com/news/new-spectre-exploits-avoid-all-mitigations-fixes-to-degrade-performance
要點:兩所大學的研究人員發現了Spectre漏洞的幾個變種。所有2011年以後的Intel處理器和2017年以後的AMD處理器,只要帶有微指令快取(micro-op caches),就能夠中招。 現在兩家都還沒有發佈修補措施。同以前的修復方法相比,要修這個漏洞會更大地拖累性能。好在這個漏洞極難利用。攻擊者必須首先繞過所有硬體和軟體的安全措施,因此即使能夠攻擊,也只會針對極高價值的目標,不會發動無目標的範圍攻擊。
=========================================
Today, we’re sharing proof-of-concept (PoC) code that confirms the practicality of Spectre exploits against JavaScript engines. We use Google Chrome to demonstrate our attack, but these issues are not specific to Chrome, and we expect that other modern browsers are similarly vulnerable to this exploitation vector. We have developed an interactive demonstration of the attack available at https://leaky.page/; the code and a more detailed writeup are published on Github here.
The demonstration website can leak data at a speed of 1kB/s when running on Chrome 88 on an Intel Skylake CPU. Note that the code will likely require minor modifications to apply to other CPUs or browser versions; however, in our tests, the attack was successful on several other processors, including the Apple M1 ARM CPU, without any major changes.
==========================================
Birds born in a cage think flying is an illness.
小笨賢 wrote:
然後再說....沒關係...資料不會被盜...裝傻~~
您好像忘了...你自己喊的


跟賢大分享防失智

5招預防阿茲海默症
在電腦前呆久了可以起來活動活動,
我也有運動,一起來

另外台積電也準備用上EPYC了,
台積電使用AMD的EPYC系列處理器用於生產線的控制工作,可靠性得到認可
Intel漏洞是AMD的15倍,台積電才不敢用Intel好嗎

自律努力讓自己變大隻
蔥油餅大叔 wrote:
M1也會中的話意味著arm...(恕刪)
這篇關於Spectre論文的試驗平台,包括Qualcomm 835跟三星Exynos 7420,也中鏢....
https://spectreattack.com/spectre.pdf
至於後續Qualcomm跟三星的處理器有沒有中?這樣講吧,沒有一顆知名的現代主流處理器/SoC,是沒有speculative execution功能的........
Birds born in a cage think flying is an illness.
小惡魔市集
關閉廣告