Click to access netspectre.pdf
#Spectre is NOT a local attack! #NetSpectre #Meltdown
Remote ASLR break with even simpler gadgets than any previous #Spectre attack required. https://t.co/XPj3gvfNhe
— Daniel Gruss (@lavados) July 26, 2018
We present NetSpectre: A remote Spectre attack without attacker-controlled code on the victim, and the first Spectre attack which works without the cache as covert channel. https://t.co/qEJ2YMROAh /cc @lavados @mlqxyz pic.twitter.com/5T1VzZDvOJ
— Michael Schwarz (@misc0110) July 26, 2018
NetSpectre: „a novel high-performance AVX-based covert channel that we use in our cache-free Spectre attack. We show that … remote Spectre attacks perform significantly better with the AVX-based covert channel, leaking 60 bits per hour“ https://t.co/0DgXEFQrOr
— Adrian Rueegsegger (@Kensan42) July 26, 2018