Lines Matching refs:attack
69 The bounds check bypass attack :ref:`[2] <spec_ref2>` takes advantage
92 The branch target injection attack takes advantage of speculative
116 the attack revealing useful data.
118 One other variant 2 attack vector is for the attacker to poison the
123 return instructions. This attack can be mitigated by flushing the return
134 Yet another variant 2 attack vector is for the attacker to poison the
141 Currently the only known real-world BHB attack vector is via
150 The following list of attack scenarios have been anticipated, but may
151 not cover all possible attack vectors.
162 a pointer for a Spectre variant 1 attack. The index or pointer
195 become visible via an L1 side channel attack.
197 A similar attack exists when coming from kernel space. The CPU can
205 target buffer (BTB) before issuing syscall to launch an attack.
226 Spectre variant 2 attack by a rogue user process. To mitigate such
233 A malicious user process can try to attack another user process,
275 The attack mechanism is similar to how user processes attack the
301 A rogue guest may attack another guest to get data accessible by the
354 and there is no guarantee that all possible attack vectors for Spectre
362 attack between user processes:
450 not cover all attack vectors for Spectre variant 1.
515 also prevent the program from launching a variant 2 attack
535 1 attack vectors.