Content deleted Content added
Citation bot (talk | contribs) Add: date. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | Category:Side-channel attacks | #UCB_Category 1/24 |
|||
(21 intermediate revisions by 7 users not shown) | |||
Line 1:
{{short description|Hardware bug}}
In digital computing, '''hardware security bugs''' are [[hardware bug]]s or flaws that create [[Vulnerability (computing)|vulnerabilities]] affecting computer [[central processing unit]]s (CPUs), or other devices which incorporate programmable processors or logic and have [[direct memory access]], which allow data to be read by a rogue process when such reading is not authorized. Such vulnerabilities are considered "catastrophic" by security analysts.<ref> {{cite web
| url=https://www.schneier.com/blog/archives/2018/01/spectre_and_mel_1.html
| author = Bruce Schneier
Line 20 ⟶ 21:
| publisher=Rudebaguette.com
| date = January 8, 2018
| quote = ''[sic]:'' The effects of these vulnerabilities are catastrophic: « at best, the vulnerability can be used by malwares and hackers to exploit other security linked bugs. At worse, the flaw can be used by
| accessdate = February 4, 2019
}} </ref>
==Speculative execution vulnerabilities==
Starting in 2017, a series of security vulnerabilities were found in the implementations of
These include:
* [[
* [[Meltdown (security vulnerability)|Meltdown]]
* [[Foreshadow (security vulnerability)|Foreshadow]]▼
* [[Microarchitectural Data Sampling]]
* [[SPOILER (security vulnerability)|SPOILER]]
* [[Pacman (security vulnerability)|Pacman]]
==Intel VISA==
In 2019 researchers discovered that a manufacturer debugging mode, known as VISA, had an undocumented feature on [[Intel Corporation|Intel]] Platform Controller Hubs,
== See also ==
Line 44 ⟶ 43:
* [[Security bug]]
* [[Computer security]]
* [[Threat (computer)]]
== References ==
Line 51:
[[category:Computer security exploits]]
[[category:Hardware bugs]]
[[category:Side-channel attacks]]
[[
|