Hacker News
- More Intel speculative execution vulnerabilities https://mdsattacks.com/#ridl-ng 249 comments
- TSX Asynchronous Abort (TAA): Speculation-Based Vulnerability in Intel CPUs https://mdsattacks.com/#ridl-ng 2 comments
- MDS: Microarchitectural Data Sampling side-channel vulnerabilities in Intel CPUs https://mdsattacks.com 111 comments
Lobsters
- More RIDL variants that remain unpatched by Intel https://mdsattacks.com/#ridl-nng 5 comments netsec
- RIDL and Fallout: MDS attacks https://mdsattacks.com/ 4 comments hardware
- New security bug in Intel CPU's http://mdsattacks.com/ 131 comments netsec
- New massive intel CPU vulnerability has been disclosed https://mdsattacks.com/ 29 comments technology
Linking pages
- Intel Fixes a Security Flaw It Said Was Repaired 6 Months Ago - The New York Times https://www.nytimes.com/2019/11/12/technology/intel-chip-fix.html 116 comments
- VU ontdekt megalek in Intel-chips - NRC https://www.nrc.nl/nieuws/2019/05/14/hackers-mikken-op-het-intel-hart-a3960208 91 comments
- CROSSTalk - https://www.vusec.net/projects/crosstalk/ 28 comments
- New speculative execution bug leaks data from Intel chips’ internal buffers | Ars Technica https://arstechnica.com/gadgets/2019/05/new-speculative-execution-bug-leaks-data-from-intel-chips-internal-buffers/ 24 comments
- Intel Reveals TAA Vulnerabilities in Cascade Lake Chips and a New JCC Bug | Tom's Hardware https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug 18 comments
- Side-Channel Attacks on Embedded Processors - EE Times https://www.eetimes.com/author.asp?amp%3Bdoc_id=1334783§ion_id=36 7 comments
- Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens https://www.cryptologie.net/article/501/hardware-solutions-to-highly-adversarial-environments-part-3-trusted-execution-environment-tee-sgx-trustzone-and-hardware-security-tokens/ 4 comments
- Side-channel attacks aren't exclusive to high-end processors - Embedded.com https://www.embedded.com/electronics-blogs/say-what-/4461996/Side-channel-attacks-aren-t-exclusive-to-high-end-processors 0 comments
- Hydra Chronicles, Part I: Pixie Dust https://www.brodieg.com/2019/05/17/pixie-dust/ 0 comments
- Secure Compilation | SIGPLAN Blog https://blog.sigplan.org/2019/07/01/secure-compilation/ 0 comments
- GitHub - nsacyber/Hardware-and-Firmware-Security-Guidance: Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance 0 comments
- Designer Vulnerabilities https://shellsharks.com/designer-vulnerabilities 0 comments
- Secure Computer Architecture in the Post-Meltdown World: A Long Road Ahead | SIGARCH https://www.sigarch.org/secure-computer-architecture-in-the-post-meltdown-world-a-long-road-ahead/ 0 comments
Related searches:
Search whole site: site:mdsattacks.com
Search title: MDS Attacks: Microarchitectural Data Sampling
See how to search.