TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Real-World Breaches from Speculative Execution Vulns?

23 点作者 PhantomPhreak大约 3 年前
For years we’ve been reading about how vulnerable so many computer systems, especially ones using Intel and AMD processors, are highly vulnerable to speculative execution attacks such as Spectre, Meltdown, Foreshadow and Fallout. Numerous demonstrations of the feasibility of these attacks have been published, seemingly showing their practicality (even in JavaScript). Microcode updates that partially mitigate them have meant significant performance slowdowns, also suggesting their practicality. Are there many cases where these vulnerabilities have led to actual security breaches of real-world systems?

4 条评论

gargletone大约 3 年前
No, for two reasons. First is that software vulnerabilities are so much more prevalent that in the real world, it would be a wasted effort to attempt to exploit these hardware side-channel vulnerabilities. There&#x27;s much lower-hanging fruit elsewhere.<p>Second is that for the most vulnerable attack scenarios, they were mitigated long before the public release of Spectre and Meltdown. The big one was cloud computing - attackers being able to exfiltrate data from VMs running on the same host. Microsoft, Amazon and Google had many months in which to roll out updates to their infrastructure that enhanced VM isolation. Similar for browser vendors, for example Chromium introducing Site Isolation. And operating system developers - mitigations for Windows kernel and Linux were being tested for months before public disclosure.
layer8大约 3 年前
I don’t think so. Probably because it’s still much easier to get users to install ransomware by phishing or by disseminating USB sticks.
gwd大约 3 年前
Keep in mind that &quot;breach&quot; here is limited to an <i>information leak</i>. Passwords could be read to achieve a privilege escalation; but a more likely attack would be stealing private keys or other sensitive information. The latter would leave no trace on the target system. So how would you know if your private keys or passwords had been stolen?
评论 #30747253 未加载
jedisct1大约 3 年前
Presumably, some malware have been trying to exploit this: <a href="https:&#x2F;&#x2F;www.techrepublic.com&#x2F;article&#x2F;spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.techrepublic.com&#x2F;article&#x2F;spectre-and-meltdown-fl...</a><p>I&#x27;ve never seen them in the wild.