Since the initial discovery of Meltdown and Spectre in 2017, different variants of these attacks have been discovered. One often overlooked variant is Meltdown 3a, also known as Meltdown-CPL-REG. Even though Meltdown-CPL-REG was initially discovered in 2018, the available information regarding the vulnerability is still sparse. In this paper, we analyze Meltdown-CPL-REG on 19 different CPUs from different vendors using an automated tool. We observe that the impact is more diverse than documented and differs from CPU to CPU. Surprisingly, while the newest Intel CPUs do not seem affected by Meltdown-CPL-REG, the newest available AMD CPUs (Zen3+) are still affected by the vulnerability. Furthermore, given our attack primitive CounterLeak, w...
Transient-execution attacks have been deemed a large threat for microarchitectures through research ...
Since the disclosure of Spectre, extensive research has been conducted on both new attacks, attack v...
Since Spectre and Meltdown's disclosure in 2018, a new category of attacks has been identified and c...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inacces...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
In this work, we present a runtime approach, called MeltdownDetector, for detecting, isolating, and ...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Large-scale attacks on networked computers are typi-cally used to create zombie armies for propagati...
Meltdown and Spectre are two vulnerabilities discovered in 2017. These vulnerabilities allow unautho...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-Eas...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
In this work we examine how the updates addressing Meltdown and Spectre vulnerabilities impact the p...
Transient-execution attacks have been deemed a large threat for microarchitectures through research ...
Since the disclosure of Spectre, extensive research has been conducted on both new attacks, attack v...
Since Spectre and Meltdown's disclosure in 2018, a new category of attacks has been identified and c...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inacces...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
In this work, we present a runtime approach, called MeltdownDetector, for detecting, isolating, and ...
Most of today's widely used operating systems are based on a monolithic design and have a very large...
Large-scale attacks on networked computers are typi-cally used to create zombie armies for propagati...
Meltdown and Spectre are two vulnerabilities discovered in 2017. These vulnerabilities allow unautho...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-Eas...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
In this work we examine how the updates addressing Meltdown and Spectre vulnerabilities impact the p...
Transient-execution attacks have been deemed a large threat for microarchitectures through research ...
Since the disclosure of Spectre, extensive research has been conducted on both new attacks, attack v...
Since Spectre and Meltdown's disclosure in 2018, a new category of attacks has been identified and c...