From b88728001aa0565604ad0bbf266e4154b535f837 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Sat, 28 Jul 2018 09:28:42 +0000 Subject: [PATCH] Relocate analysis of SSCA vulnerabilities from Exploits section to Articles --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 7195685..4c10b73 100644 --- a/README.md +++ b/README.md @@ -356,11 +356,13 @@ _return-to-libc techniques_ #### Exploitation: Vulnerability: Speculative Side-Channel Attacks -- [A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature](A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature) +- [A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature](https://www.fortinet.com/blog/threat-research/a-deep-dive-analysis-of-microsoft-s-kernel-virtual-address-shadow-feature.html) - [An accessible overview of Meltdown and Spectre, Part 1](https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/) - [An accessible overview of Meltdown and Spectre, Part 2](https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/) +- [Explainer on #Spectre & #Meltdown](https://twitter.com/gsuberland/status/948907452786933762) - [KVA Shadow: Mitigating Meltdown on Windows](https://blogs.technet.microsoft.com/srd/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/) - [Post-Spectre Threat Model Re-Think](https://chromium.googlesource.com/chromium/src/+/master/docs/security/side-channel-threat-model.md) +- [Reading privileged memory with a side-channel](https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html) - [Total Meltdown?](https://blog.frizk.net/2018/03/total-meltdown.html) --- @@ -1271,13 +1273,11 @@ _return-to-libc techniques_ Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.