YoVDO

SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks

Offered By: IEEE via YouTube

Tags

Cybersecurity Courses Spectre Courses

Course Description

Overview

Explore a cutting-edge security presentation that delves into SpecHammer, a novel attack combining Spectre and Rowhammer vulnerabilities. Learn about the limitations of Spectre v1 and how SpecHammer overcomes them through double and triple gadget techniques. Discover the intricacies of memory templating and massaging, and understand their role in enhancing the attack's effectiveness. Gain insights into the results of both double and triple gadget implementations, and grasp the implications for modern computer security. Conclude with a comprehensive overview of the gadgets used and the potential impact of this innovative attack method on current and future cybersecurity landscapes.

Syllabus

Intro
Spectre v1
Spectre's Limitations
SpecHammer (double gadget)
Double Gadget Results
SpecHammer (triple gadget)
Memory Templating
Triple Gadget Results
Gadgets
Conclusion
Memory Massaging


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Transient-Execution Attacks: Understanding Meltdown and Spectre
Graz University of Technology via edX
Computer Security: A Hands-on Approach
Udemy
Side-Channel Attacks
TheIACR via YouTube
Spectre, Meltdown, & Linux
Linux Foundation via YouTube
A Little Less Speculation, a Little More Action - A Deep Dive into Fuchsia's Mitigations for Specific CPU Side-Channel Attacks
Black Hat via YouTube