Jump to content

Hardware security bug

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Cloud29371 (talk | contribs) at 10:39, 17 April 2019 (See also). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In digital computing, hardware security bugs are a class of vulnerabilities affecting computer central processing units (CPUs) which allow data to be read by a rogue process when such reading is not authorized. Such vulnerabilities are considered "catastrophic" by security analysts.[1][2][3] These vulnerabilities are based on exploiting side effects of speculative execution, a technique used by many high performance CPUs to improve processing speed.

See also

References

  1. ^ Bruce Schneier (January 5, 2018). "Spectre and Meltdown Attacks Against Microprocessors – Schneier on Security". www.schneier.com. Retrieved February 4, 2019. Spectre and Meltdown are pretty catastrophic vulnerabilities, ...
  2. ^ "This Week in Security: Internet Meltdown Over Spectre of CPU Bug". Cylance.com. 2018-01-05. Retrieved February 4, 2019. The security implications of the Meltdown and Spectre vulnerabilities are indeed catastrophic for systems engineering.
  3. ^ "Meltdown, Spectre: here's what you should know". Rudebaguette.com. January 8, 2018. Retrieved February 4, 2019. [sic]: The effects of these vulnerabilities are catastrophic: « at best, the vulnerability can be used by malwares and hackers to exploit other security linked bugs. At worse, the flaw can be used by softwares and authentified users to read the kernel's memory