Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities

Автор: media.ccc.de

Загружено: 2026-01-04

Просмотров: 15150

Описание:

Transient execution CPU vulnerabilities, like Spectre, have been making headlines since 2018. However, their most common critique is that these types of vulnerabilities are not really practical. Even though it is cool to leak `/etc/shadow` with a CPU bug, it has limited real-world impact. In this talk, we take Spectre out for a walk and let it see the clouds, by leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks. Our report was awarded with a $151,515 bug bounty, Google Cloud's highest bounty yet.

Seven years ago, Spectre and Meltdown were announced. These two vulnerabilities showed that instructions executed by the CPU might accidentally access secret data. This secret data can contain files cached from disk, cryptographic keys, private information, or anything else that might be stored in memory. An attacker can use Spectre to learn the value of that secret data, even though the attacker is not supposed to have access to it.

Even though this sounds problematic, there is a reason why these type of vulnerabilities haven't had a significant real-world impact. Mitigations make it much harder to pull off, and an attacker needs a form of remote code execution anyway to trigger the relevant CPU instructions. If an attacker can already execute arbitrary code, then Spectre is probably not what you should be worried about. For regular users, these CPU vulnerabilities are likely not that much of a threat.

However, that is not the case for public cloud providers. Their business model is to provide *remote code execution as a service*, and to rent out shared hardware resources as efficiently as possible. Customers run their system in an seemingly isolated virtual machine on top of shared physical hardware. Because customers can run anything they want on these systems, public cloud providers must treat these workloads as untrusted. They have to assume the worst case scenario, i.e. that an attacker is deliberately trying violate the confidentiality, integrity or availability of their systems, and, by extension, their customers' systems. For transient execution vulnerabilities like Spectre, that means that they enable all reasonable mitigations, and some more.

In this talk, we show that transient execution attacks can be used on real-world systems, despite the deployed software mitigations. We demonstrate this by silently leaking secret data from another virtual machine at a major global cloud provider, defeating virtual machine isolation without leaving a trace. Additionally, we'll discuss our coordinated disclosure process, the currently deployed mitigations and how future mitigations could address the issue.

Thijs Raymakers

https://events.ccc.de/congress/2025/h...

#39c3 #Security

Licensed to the public under http://creativecommons.org/licenses/b...

39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

39C3 - Watch Your Kids: Inside a Children's Smartwatch

39C3 - Watch Your Kids: Inside a Children's Smartwatch

Decrypting SSL Traffic from a Chinese Security Camera - Hacking the Anran IP Camera

Decrypting SSL Traffic from a Chinese Security Camera - Hacking the Anran IP Camera

8 Channel LED Chaser Using ATtiny85 and 74HC595

8 Channel LED Chaser Using ATtiny85 and 74HC595

39C3 - How to render cloud FPGAs useless

39C3 - How to render cloud FPGAs useless

What If You Keep Slowing Down?

What If You Keep Slowing Down?

Plan 9: Not dead, Just Resting, by Ori Bernstein

Plan 9: Not dead, Just Resting, by Ori Bernstein

Дерек уходит из Veritasium?

Дерек уходит из Veritasium?

39C3 - Excuse me, what precise time is It?

39C3 - Excuse me, what precise time is It?

The World's Most Important Machine

The World's Most Important Machine

Атаки Spectre, использующие спекулятивное исполнение.

Атаки Spectre, использующие спекулятивное исполнение.

Linux Says “Goodbye, Russia

Linux Says “Goodbye, Russia"

39C3 - Xous: A Pure-Rust Rethink of the Embedded Operating System

39C3 - Xous: A Pure-Rust Rethink of the Embedded Operating System

Bill Gates SHOCKED as Windows Users ABANDON Microsoft for Linux!

Bill Gates SHOCKED as Windows Users ABANDON Microsoft for Linux!

39C3 - Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot

39C3 - Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot

WTF dude..

WTF dude..

Building the PERFECT Linux PC with Linus Torvalds

Building the PERFECT Linux PC with Linus Torvalds

39C3 - When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU

39C3 - When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU

39C3 - Asahi Linux - Porting Linux to Apple Silicon

39C3 - Asahi Linux - Porting Linux to Apple Silicon

💾СОБРАЛ NAS НА TrueNAS💽 НЕ ПОНИМАЮ, КАК ЖИЛ БЕЗ НЕГО САМОДЕЛЬНОЕ ХРАНИЛИЩЕ ЭТО ПРОСТО

💾СОБРАЛ NAS НА TrueNAS💽 НЕ ПОНИМАЮ, КАК ЖИЛ БЕЗ НЕГО САМОДЕЛЬНОЕ ХРАНИЛИЩЕ ЭТО ПРОСТО

Building a Linux CPU Monitor in Bash From Scratch! small htop-like clone using the /proc filesystem

Building a Linux CPU Monitor in Bash From Scratch! small htop-like clone using the /proc filesystem

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com