Johannes Wikner and Kaveh Razavi exposed a critical cross-process Spectre attack, revealing failures in Address Space Layout Randomization on modern Intel processors.
Spectre exploits the speculative execution of processors, manipulating branch predictions to access out-of-bounds memory containing sensitive secrets like passwords.
The indirect branch predictor barrier (IBPB) was implemented to defend against Spectre v2, but researchers found it wasn't executed effectively in recent Intel architectures.
Despite ongoing efforts to address Spectre, the findings suggest significant vulnerabilities remain in both chip architecture and implementation of security measures.
Collection
[
|
...
]