Hacker News
- “Negative Result: Reading Kernel Memory from User Mode” (Intel CPU Bug) https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/ 7 comments
- Negative Result: Reading Kernel Memory from User Mode https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/ 5 comments
Linking pages
- How the industry-breaking Spectre bug stayed secret for seven months - The Verge https://www.theverge.com/2018/1/11/16878670/meltdown-spectre-disclosure-embargo-google-microsoft-linux 371 comments
- A long two months | arekinath.blog https://blog.cooperi.net/a-long-two-months 18 comments
- How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once | WIRED https://www.wired.com/story/meltdown-spectre-bug-collision-intel-chip-flaw-discovery/ 4 comments
- The impromptu Slack war room where ‘Net companies unite to fight Spectre-Meltdown | Ars Technica https://arstechnica.com/information-technology/2018/01/the-impromptu-slack-war-room-where-net-companies-unite-to-fight-spectre-meltdown/ 1 comment
- A Review Of The Intel/x86 KPTI Fiasco https://eklitzke.org/a-review-of-the-intel-x86-kpti-fiasco 0 comments
- Behind the scenes of a bug collision – cyber.wtf https://cyber.wtf/2018/01/05/behind-the-scene-of-a-bug-collision/ 0 comments
- How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once | WIRED https://www.wired.com/story/meltdown-spectre-bug-collision-intel-chip-flaw-discovery/?mbid=social_twitter 0 comments
- Major Computer Chip Bugs Show the Need for Open Security Research https://reason.com/archives/2018/01/09/major-computer-chip-bugs-show-the-need-f 0 comments
- GitHub - paboldin/meltdown-exploit: Meltdown Exploit PoC https://github.com/paboldin/meltdown-exploit 0 comments
Related searches:
Search whole site: site:cyber.wtf
Search title: Negative Result: Reading Kernel Memory From User Mode – cyber.wtf
See how to search.