Spoiler (security vulnerability)
|Date discovered||November 2018|
|Discoverer|| Worcester Polytechnic Institute|
University of Lübeck
|Affected hardware||Modern Intel microprocessors|
Spoiler is a security vulnerability on modern computer central processing units that use speculative execution. It exploits side-effects of speculative execution to improve the efficiency of Rowhammer and other related memory and cache attacks. According to reports, all modern Intel Core CPUs are vulnerable to the attack as of 2019[update]. AMD has stated that its processors are not vulnerable.
- Tung, Liam. "All Intel chips open to new Spoiler non-Spectre attack: Don't expect a quick fix". ZDNet. Retrieved 2019-03-18.
- Owen, Malcolm; March 05; 2019; PT, 01:42 pm. "New 'Spoiler' vulnerability in all Intel Core processors exposed by researchers". AppleInsider. Retrieved 2019-03-18.CS1 maint: numeric names: authors list (link)
- "SPOILER | AMD". www.amd.com. Retrieved 2019-03-18.
- "AMD Confirms Its Processors Aren't Impacted by Spoiler Vulnerability". Tom's Hardware. 2019-03-17. Retrieved 2019-03-18.
- Islam, Saad; Moghimi, Ahmad; Bruhns, Ida; Krebbel, Moritz; Gulmezoglu, Berk; Eisenbarth, Thomas; Sunar, Berk (2019-03-01). "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks". arXiv:1903.00446v1. Bibcode:2019arXiv190300446I. Cite journal requires
- CVE-2019-0162 at National Vulnerability Database
|This computer science article is a stub. You can help Wikipedia by expanding it.|
|This computer security article is a stub. You can help Wikipedia by expanding it.|