spectre-attack icon indicating copy to clipboard operation
spectre-attack copied to clipboard

Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)

Results 7 spectre-attack issues
Sort by recently updated
recently updated
newest added

the if on line 31 succeeds if x is negative. This is a problem if the compiler puts secret at a lower address than array1, which is the case on...

Those Zen3 chips are vulnerable to this attack as well?

So perhaps I am being obtuse here, but this attack code directly receives the starting address and length of the secret string, does it not? It is reading bytes using...

It's easy to build it on even *BSD because it requires only standard C header, Thanks. I did make & run, then result on FreeBSD 11.1(sakura public cloud and local...

gcc output ``` spectre.c:83:21: warning: passing 'int *' to parameter of type 'unsigned int *' converts between pointers to integer types with different sign [-Wpointer-sign] time1 = __rdtscp(&junk); /* READ...

Getting error running this in linux on dual core cpu : ``` Putting 'The Magic Words are Squeamish Ossifrage.' in memory Reading 40 bytes: illegal hardware instruction ``` ``` $...

When I was compiling the file "Source.c" in Red Hat Enterprise release 6.5, always report the error: undefined reference to `__rdtscp'.