Transient Execution Attacks explained to your Grandma
byFebruary 22, 2019
What? Reading kernel memory from user space? What?
I explained, at the 5th meeting of DC11396, how modern processor optimizations such as branch prediction and out-of-order execution may lead to leak of secrets through the CPU’s microarchitectural state. Numerous attacks have been proposed, this is an overview of the state of the art of these techniques: