Announcement

Collapse
No announcement yet.

Security Researchers Detail New "BlindSide" Speculative Execution Attack

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Vistaus
    replied
    An attack that works on an AMD CPU? Is this fake news or what? 'Cause everyone, esp. on this site, keeps saying AMD is 100% safe against this kind of stuff...

    Leave a comment:


  • NotMine999
    replied
    Originally posted by Raka555 View Post
    Can we get a 5Ghz Cortex-A53, please...
    And if that wish of yours is proven to also suffer from these flaws? Then what?

    Leave a comment:


  • boxie
    replied
    this is pretty neat research, I wonder what sort of mitigations can be put in place and what the perf hit will be.

    Leave a comment:


  • Jabberwocky
    replied
    Originally posted by Danny3 View Post
    Oh come on, not again!
    Not sure why you are surprised. I would be surprised if this is last one that will be found.

    Leave a comment:


  • pranav
    replied
    c o o l

    Leave a comment:


  • Danny3
    replied
    Oh come on, not again!

    Leave a comment:


  • chuckula
    replied
    So if the kernel has buffer overrun vulnerabilities then it's vulnerable to this wacky attack too... I would say that the buffer overflow is the real problem here.

    Leave a comment:


  • Raka555
    replied
    Can we get a 5Ghz Cortex-A53, please...

    Leave a comment:


  • Security Researchers Detail New "BlindSide" Speculative Execution Attack

    Phoronix: Security Researchers Detail New "BlindSide" Speculative Execution Attack

    Security researchers from Amsterdam have publicly detailed "BlindSide" as a new speculative execution attack vector for both Intel and AMD processors...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite
Working...
X