Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


In this Discussion

Spectre reloaded: Spectre-BHB
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Spectre reloaded: Spectre-BHB

M66BM66B Veteran

How does this differ from Spectre-v2? BHI essentially is an extension of Spectre v2, where we leverage the global history to re-introduce the exploitation of cross-privilege BTI. Therefore the attacker primitive is still Spectre v2, but by injecting the history across privilege boundaries (BHI), we can exploit systems that deploy new in-hardware mitigations (i.e., Intel eIBRS and Arm CSV2).

Which systems are affected by BHI? Short answer: If you have an Intel or Arm CPU that was affected by Spectre-v2, you’re likely to be affected by BHI too. AMD seems not to be affected.

https://www.vusec.net/projects/bhi-spectre-bhb/

"We have leaked the root hash password"

Thanked by 1bulbasaur

Comments

  • At this rate it seems to me we should just go back to non-speculative execution based architectures.

Sign In or Register to comment.