Computer vulnerability using speculative execution
Main articles: Downfall (security vulnerability), Foreshadow, Lazy FP state restore, Load value injection, Meltdown (security vulnerability), Microarchitectural Data Sampling, Retbleed, Spectre (security vulnerability), Speculative Store Bypass, and SWAPGS (security vulnerability)
Transient execution CPU vulnerabilities are vulnerabilities in a computer system in which a speculative execution optimization implemented in a microprocessor is exploited to leak secret data to an unauthorized party. The archetype is Spectre, and transient execution attacks like Spectre belong to the cache-attack category, one of several categories of side-channel attacks. Since January 2018 many different cache-attack vulnerabilities have been identified.
and 19 Related for: Transient execution CPU vulnerability information
TransientexecutionCPUvulnerabilities are vulnerabilities in a computer system in which a speculative execution optimization implemented in a microprocessor...
workstation List of AMD CPU microarchitectures Marvell Technology Group XScale microarchitecture TransientexecutionCPUvulnerability Rant, Jon; "Extending...
ARM64/ARMv8-A List of Intel CPU microarchitectures List of AMD processors Table of AMD processors TransientexecutionCPUvulnerability Hesseldahl, Arik (2000-07-06)...
Sometimes misspelled "RSRE" TransientexecutionCPUvulnerabilities Website detailing the Meltdown and Spectre vulnerabilities, hosted by Graz University...
later this year [2018]." TransientexecutionCPUvulnerabilities Hardware security bug TLBleed, similar security vulnerability "Foreshadow - Breaking the...
bugs are hardware bugs or flaws that create vulnerabilities affecting computer central processing units (CPUs), or other devices which incorporate programmable...
it is a variant of the Spectre vulnerability which exploits retpoline, which was a mitigation for speculative execution attacks. According to the researchers...
Intel CPU microarchitectures List of VIA microprocessor cores List of x86 manufacturers Interrupt request iAPX TransientexecutionCPUvulnerability Tick–tock...
its website detailing its plans to mitigate ZombieLoad. TransientexecutionCPUvulnerabilities Hardware security bug Greenberg, Andy (2019-05-14). "Meltdown...
address the vulnerability. The OpenBSD project claims to have discovered the vulnerability independently. TransientexecutionCPUvulnerabilities "Lazy FP...
of the problem. TransientexecutionCPUvulnerability Zombieload Williams, Chris (2018-06-22). "Meet TLBleed: A crypto-key-leaking CPU attack that Intel...
implementation of a computer system TransientexecutionCPUvulnerability – Computer vulnerability using speculative execution "Hertzbleed Attack". Hertzbleed...
instruction codes implementing trusted execution environment that are built into some Intel central processing units (CPUs). They allow user-level and operating...
normal motherboard possibly leading to a security vulnerability. The Intel Pentium series of CPUs had two well-known bugs discovered after it was brought...
CPU microcode). It consists of minimal code written in assembly language for the specific architecture. It initializes a temporary memory (often CPU cache...
the CPU, the other to the VIC-II and the user may select what chip sees what.[citation needed] In CP/M mode, the Program Segment Prefix and Transient Program...
Evtyushkin, Dmitry; Gruss, Daniel (2018). "A Systematic Evaluation of TransientExecution Attacks and Defenses". arXiv:1811.05441 [cs.CR]. Intel Architecture...