Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
-
Updated
Jul 21, 2020 - C++
Variant 1 of the Spectre attack which is to bypass the bounds checks in the target process and retrieve the private data. Here in this example, I have demonstrated how to retrieve a string data using the attack.
A simple implementation of spectre vulnerability using Go
Spectre attack variant 1 is used here to extract an image data buffer from a program. The output image data is then decoded and median filters are applied to remove the hot pixels in the output image. Here I have included files for RGB and base64 format.
A simple demo of the Spectre vulnerability
Meltdown & Spectre - catastrophic vulnerabilities - exploited 🛡️
Add a description, image, and links to the spectre-demo topic page so that developers can more easily learn about it.
To associate your repository with the spectre-demo topic, visit your repo's landing page and select "manage topics."