By: ribit (anon.delete@this.anon.com), May 1, 2022 6:00 am
Room: Moderated Discussions
Found this interesting paper https://www.prefetchers.info/augury.pdf
I have no idea how side-channel attacks work and the details in the paper are way over my head. Do I understand it correctly that this can only be used to leak data from the same virtual memory space? Or can one also use these kind of attacks to guess the data from other processes?
I have no idea how side-channel attacks work and the details in the paper are way over my head. Do I understand it correctly that this can only be used to leak data from the same virtual memory space? Or can one also use these kind of attacks to guess the data from other processes?