• ClipSaver
  • dtub.ru
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities скачать в хорошем качестве

39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities 2 недели назад

скачать видео

скачать mp3

скачать mp4

поделиться

телефон с камерой

телефон с видео

бесплатно

загрузить,

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: 39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities в качестве 4k

У нас вы можете посмотреть бесплатно 39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон 39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities

Transient execution CPU vulnerabilities, like Spectre, have been making headlines since 2018. However, their most common critique is that these types of vulnerabilities are not really practical. Even though it is cool to leak `/etc/shadow` with a CPU bug, it has limited real-world impact. In this talk, we take Spectre out for a walk and let it see the clouds, by leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks. Our report was awarded with a $151,515 bug bounty, Google Cloud's highest bounty yet. Seven years ago, Spectre and Meltdown were announced. These two vulnerabilities showed that instructions executed by the CPU might accidentally access secret data. This secret data can contain files cached from disk, cryptographic keys, private information, or anything else that might be stored in memory. An attacker can use Spectre to learn the value of that secret data, even though the attacker is not supposed to have access to it. Even though this sounds problematic, there is a reason why these type of vulnerabilities haven't had a significant real-world impact. Mitigations make it much harder to pull off, and an attacker needs a form of remote code execution anyway to trigger the relevant CPU instructions. If an attacker can already execute arbitrary code, then Spectre is probably not what you should be worried about. For regular users, these CPU vulnerabilities are likely not that much of a threat. However, that is not the case for public cloud providers. Their business model is to provide *remote code execution as a service*, and to rent out shared hardware resources as efficiently as possible. Customers run their system in an seemingly isolated virtual machine on top of shared physical hardware. Because customers can run anything they want on these systems, public cloud providers must treat these workloads as untrusted. They have to assume the worst case scenario, i.e. that an attacker is deliberately trying violate the confidentiality, integrity or availability of their systems, and, by extension, their customers' systems. For transient execution vulnerabilities like Spectre, that means that they enable all reasonable mitigations, and some more. In this talk, we show that transient execution attacks can be used on real-world systems, despite the deployed software mitigations. We demonstrate this by silently leaking secret data from another virtual machine at a major global cloud provider, defeating virtual machine isolation without leaving a trace. Additionally, we'll discuss our coordinated disclosure process, the currently deployed mitigations and how future mitigations could address the issue. Thijs Raymakers https://events.ccc.de/congress/2025/h... #39c3 #Security Licensed to the public under http://creativecommons.org/licenses/b...

Comments
  • 39C3 - Watch Your Kids: Inside a Children's Smartwatch 22 часа назад
    39C3 - Watch Your Kids: Inside a Children's Smartwatch
    Опубликовано: 22 часа назад
  • 39C3 - Excuse me, what precise time is It? 3 недели назад
    39C3 - Excuse me, what precise time is It?
    Опубликовано: 3 недели назад
  • Thomas Hahn: Beyond Autocomplete - AI-Assisted Development In VS Code 11 дней назад
    Thomas Hahn: Beyond Autocomplete - AI-Assisted Development In VS Code
    Опубликовано: 11 дней назад
  • What If You Keep Slowing Down? 18 часов назад
    What If You Keep Slowing Down?
    Опубликовано: 18 часов назад
  • 39C3 - A Tale of Two Leaks: How Hackers Breached the Great Firewall of China 3 недели назад
    39C3 - A Tale of Two Leaks: How Hackers Breached the Great Firewall of China
    Опубликовано: 3 недели назад
  • Plan 9: Not dead, Just Resting, by Ori Bernstein 6 лет назад
    Plan 9: Not dead, Just Resting, by Ori Bernstein
    Опубликовано: 6 лет назад
  • The TRUTH about How LTT SPENDS Money 4 дня назад
    The TRUTH about How LTT SPENDS Money
    Опубликовано: 4 дня назад
  • Компания Salesforce признала свою ошибку. 1 день назад
    Компания Salesforce признала свою ошибку.
    Опубликовано: 1 день назад
  • JetKVM - девайс для удаленного управления вашими ПК 2 дня назад
    JetKVM - девайс для удаленного управления вашими ПК
    Опубликовано: 2 дня назад
  • 39C3 - How to render cloud FPGAs useless 2 недели назад
    39C3 - How to render cloud FPGAs useless
    Опубликовано: 2 недели назад
  • 39C3 - Xous: A Pure-Rust Rethink of the Embedded Operating System 12 дней назад
    39C3 - Xous: A Pure-Rust Rethink of the Embedded Operating System
    Опубликовано: 12 дней назад
  • Я в опасности 3 дня назад
    Я в опасности
    Опубликовано: 3 дня назад
  • 39C3 - Light in the Dark(net) 2 недели назад
    39C3 - Light in the Dark(net)
    Опубликовано: 2 недели назад
  • What can happen if you take your GPU to a repair shop ? 3 дня назад
    What can happen if you take your GPU to a repair shop ?
    Опубликовано: 3 дня назад
  • I’m Done Being Mad 2 дня назад
    I’m Done Being Mad
    Опубликовано: 2 дня назад
  • 39C3 - When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU 22 часа назад
    39C3 - When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU
    Опубликовано: 22 часа назад
  • Gary Marcus on the Massive Problems Facing AI & LLM Scaling | The Real Eisman Playbook Episode 42 19 часов назад
    Gary Marcus on the Massive Problems Facing AI & LLM Scaling | The Real Eisman Playbook Episode 42
    Опубликовано: 19 часов назад
  • Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО? 1 месяц назад
    Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?
    Опубликовано: 1 месяц назад
  • 39C3 - Asahi Linux - Porting Linux to Apple Silicon 9 дней назад
    39C3 - Asahi Linux - Porting Linux to Apple Silicon
    Опубликовано: 9 дней назад
  • 39C3 - AI Agent, AI Spy 2 недели назад
    39C3 - AI Agent, AI Spy
    Опубликовано: 2 недели назад

Контактный email для правообладателей: u2beadvert@gmail.com © 2017 - 2026

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5