A Dirty Little History
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the evolution of Spectre vulnerabilities and their mitigations in this 50-minute conference talk from Recon 2022. Delve into the history of Spectre-v2, its initial software mitigations, and the subsequent hardware defenses implemented by Intel and Arm. Learn about the newly discovered "Branch History Injection" (BHI) attack primitive that bypasses these hardware mitigations. Gain insights into the black-box reverse engineering approach used to understand complex CPU defenses. Witness an end-to-end exploit demonstration leaking kernel memory on fully patched Intel 11th gen CPUs. Conclude with an overview of the latest Spectre defenses deployed after the BHI disclosure, highlighting the ongoing interplay between software and hardware mitigations in cybersecurity.
Syllabus
Recon 2022 - A Dirty Little History
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube