Papers of the day   All papers

V0LTpwn: Attacking x86 Processor Integrity from Software

Comments

Binni Shah: V0LTpwn : Attacking x86 Processor Integrity from Software : https://arxiv.org/pdf/1912.04870.pdf (pdf) https://t.co/dRhFY9Ferv

1 replies, 202 likes


Catalin Cimpanu: CVE-2019-11157 - the vulnerability with three names and two logos Plundervolt: https://plundervolt.com/ VoltJockey: http://voltjockey.com/ V0LTpwn: https://arxiv.org/abs/1912.04870 https://t.co/NMprhSKRj0

1 replies, 40 likes


Martial Gervaise: CVE-2019-11157 - the vulnerability with three names and two logos Plundervolt: http://plundervolt.com VoltJockey: http://voltjockey.com V0LTpwn: http://arxiv.org/abs/1912.04870 via @campuscodi https://t.co/uALlWEvkMD

0 replies, 3 likes


Léalinux: https://t.co/SPGDtgrUAf

0 replies, 2 likes


FreeBSD Help: V0LTpwn: Attacking x86 Processor Integrity from Software - https://arxiv.org/abs/1912.04870

0 replies, 1 likes


Arrigo Triulzi: Z. Kenjar et al., “V0LTpwn: Attacking x86 Processor Integrity from Software” […our attack is to undervolt a physical core to force non-recoverable hardware faults…CPU instructions will continue to execute with erroneous results and without crashes…] https://arxiv.org/abs/1912.04870

0 replies, 1 likes


Lone Ranger 🇮🇳: V0LTpwn: Attacking x86 Processor Integrity from Software: https://arxiv.org/pdf/1912.04870.pdf (pdf)

0 replies, 1 likes


Xeno Kovah: 12/10/2019 by @zkenjar et al. SGX: V0LTpwn: Attacking x86 Processor Integrity from Software https://arxiv.org/abs/1912.04870

1 replies, 0 likes


Content

Found on Apr 12 2020 at https://arxiv.org/pdf/1912.04870.pdf

PDF content of a computer science paper: V0LTpwn: Attacking x86 Processor Integrity from Software