作者
Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz
发表日期
2020
研讨会论文
The 29th USENIX Security Symposium (USENIX Security 2020)
简介
In May 2019, a new class of transient execution attack based on Meltdown called microarchitectural data sampling (MDS), was disclosed. MDS enables adversaries to leak secrets across security domains by collecting data from shared CPU resources such as data cache, fill buffers, and store buffers. These resources may temporarily hold data that belongs to other processes and privileged contexts, which could falsely be forwarded to memory accesses of an adversary.
引用总数
2020202120222023202481526318
学术搜索中的文章