SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
Offered By: IEEE via YouTube
Course Description
Overview
Explore a cutting-edge security presentation that delves into SpecHammer, a novel attack combining Spectre and Rowhammer vulnerabilities. Learn about the limitations of Spectre v1 and how SpecHammer overcomes them through double and triple gadget techniques. Discover the intricacies of memory templating and massaging, and understand their role in enhancing the attack's effectiveness. Gain insights into the results of both double and triple gadget implementations, and grasp the implications for modern computer security. Conclude with a comprehensive overview of the gadgets used and the potential impact of this innovative attack method on current and future cybersecurity landscapes.
Syllabus
Intro
Spectre v1
Spectre's Limitations
SpecHammer (double gadget)
Double Gadget Results
SpecHammer (triple gadget)
Memory Templating
Triple Gadget Results
Gadgets
Conclusion
Memory Massaging
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network