Lines Matching full:attack
69 The bounds check bypass attack :ref:`[2] <spec_ref2>` takes advantage
92 The branch target injection attack takes advantage of speculative
116 the attack revealing useful data.
118 One other variant 2 attack vector is for the attacker to poison the
123 return instructions. This attack can be mitigated by flushing the return
134 Yet another variant 2 attack vector is for the attacker to poison the
141 Previously the only known real-world BHB attack vector was via unprivileged
146 Attack scenarios
149 The following list of attack scenarios have been anticipated, but may
150 not cover all possible attack vectors.
161 a pointer for a Spectre variant 1 attack. The index or pointer
194 become visible via an L1 side channel attack.
196 A similar attack exists when coming from kernel space. The CPU can
204 target buffer (BTB) before issuing syscall to launch an attack.
225 Spectre variant 2 attack by a rogue user process. To mitigate such
232 A malicious user process can try to attack another user process,
274 The attack mechanism is similar to how user processes attack the
300 A rogue guest may attack another guest to get data accessible by the
353 and there is no guarantee that all possible attack vectors for Spectre
361 attack between user processes:
466 not cover all attack vectors for Spectre variant 1.
549 also prevent the program from launching a variant 2 attack
568 1 attack vectors.