Government of the Republic of Trinidad and Tobago
gov.tt

Spectre SideChannel Vulnerability Report

Spectre SideChannel Vulnerability Report

Spectre attacks involve inducing a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim’s confidential information via a side channel to the adversary. This paper describes practical attacks that combine methodology from side channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim’s process. More broadly, the paper shows that speculative execution implementations violate the security assumptions underpinning numerous software security mechanisms, including operating system process separation, static analysis, containerization, just-in-time (JIT) compilation, and countermeasures to cache timing/side-channel attacks. These attacks represent a serious threat to actual systems, since vulnerable speculative execution capabilities are found in microprocessors from Intel, AMD, and ARM that are used in billions of devices.

Read more about “Spectre SideChannel Vulnerability Report” which can be downloaded via the TTCSIRT Website at https://ttcsirt.gov.tt/documents/spectre.pdf