Hacker News
Lobsters
- Retbleed: Arbitrary Speculative Code Execution with Return Instructions https://comsec.ethz.ch/research/microarch/retbleed/ 7 comments security
- Retbleed: Arbitrary Speculative Code Execution with Return Instructions. Spectre variant affecting zen 1,1+,2, and intel gen 6-8. https://comsec.ethz.ch/research/microarch/retbleed/ 4 comments technology
Linking pages
- "Retbleed" Published As Arbitrary Speculative Execution With Return Instructions - Phoronix https://www.phoronix.com/scan.php?page=news_item&px=RETBLEED 59 comments
- SecureDrop 2.4.2 Released https://securedrop.org/news/securedrop-2_4_2-released/ 1 comment
- security-research/pocs/cpus/ret2aslr at master · google/security-research · GitHub https://github.com/google/security-research/tree/master/pocs/cpus/ret2aslr 1 comment
- Designer Vulnerabilities https://shellsharks.com/designer-vulnerabilities 0 comments
Linked pages
- Project Zero: Reading privileged memory with a side-channel https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html 630 comments
- LKML: David Woodhouse: Re: [RFC 09/10] x86/enter: Create macros to restrict/unrestrict Indirect Branch Speculation https://lkml.org/lkml/2018/1/22/598 164 comments
- Retpoline: a software construct for preventing branch-target-injection - Google Help https://support.google.com/faqs/answer/7625886 18 comments
- Return Stack Buffer Underflow / CVE-2022-29901, CVE-2022-28693 /... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html 6 comments
- USENIX Security '22 Technical Sessions | USENIX https://www.usenix.org/conference/usenixsecurity22/technical-sessions 4 comments
Related searches:
Search whole site: site:comsec.ethz.ch
Search title: Retbleed: Arbitrary Speculative Code Execution with Return Instructions - Computer Security Group
See how to search.