Главная
Study mode:
on
1
Intro
2
Side Channels 101
3
Bad Speculation
4
Rage Against The Machine Clear
5
Security Analysis of Machine Clear
6
Self-Modifying Code Machine Clear
7
Speculative Code Store Bypass (SCSB)
8
Memory Ordering Machine Clear
9
Floating-Point Machine Clear
10
3. Memory Leak
11
4. ASLR Bypass
12
Floating-Point Value Injection (FPVI)
13
Memory Disambiguation Machine Clear
14
Transient Execution Capabilities
15
Root-Cause Classification of Transient Execution
16
Disclosure & Affected CPUs
Description:
Explore the latest developments in transient execution attacks and their root causes in this 40-minute conference talk from the Hack In The Box Security Conference. Delve into previously unexplored machine clear events, including Floating Point MC, Self-Modifying Code MC, Memory Ordering MC, and Memory Disambiguation MC. Discover new attack primitives like Floating Point Value Injection (FPVI) and Speculative Code Store Bypass (SCSB), and learn about an end-to-end FPVI exploit on the Mozilla SpiderMonkey JavaScript engine. Examine proposed mitigations for these attack primitives and their performance impact. Gain insights into a new root cause-based classification of known transient execution paths, presented by Ph.D. researchers Enrico Barberis and Hany Ragab from the System Security Group at Vrije Universiteit Amsterdam.

Rage Against The Machine Clear

Hack In The Box Security Conference
Add to list
0:00 / 0:00