Side-channel attacks

Speculative Store Bypass

Speculative Store Bypass (SSB) (CVE-2018-3639) is the name given to a hardware security vulnerability and its exploitation that takes advantage of speculative execution in a similar way to the Meltdown and Spectre security vulnerabilities. It affects the ARM, AMD and Intel families of processors. It was discovered by researchers at Microsoft Security Response Center and Google Project Zero (GPZ). After being leaked on 3 May 2018 as part of a group of eight additional Spectre-class flaws provisionally named Spectre-NG, it was first disclosed to the public as "Variant 4" on 21 May 2018, alongside a related speculative execution vulnerability designated "Variant 3a". (Wikipedia).

Video thumbnail

PCB Wall

What to do with all those old PCBs from stuff you've taken apart...

From playlist Projects & Installations

Video thumbnail

A Rare Look Inside Shanghai Tower

Get a glimpse of the sky gardens, which set Shanghai Tower apart from any high-rise ever built. http://bit.ly/1aNxP18

From playlist Shanghai Tower | The B1M Mail Feature

Video thumbnail

Building a Chest of Drawers

via YouTube Capture

From playlist Random

Video thumbnail

Combination Locks - Intro to Algorithms

This video is part of an online course, Intro to Algorithms. Check out the course here: https://www.udacity.com/course/cs215.

From playlist Introduction to Algorithms

Video thumbnail

Outtakes

Yes. I make mistakes ... rarely. http://www.flippingphysics.com

From playlist Miscellaneous

Video thumbnail

Kernel Recipes 2018 - Mitigating Spectre and Meltdown vulnerabilities - David Woodhouse

The Spectre and Meltdown vulnerabilities are part of a class of hardware flaws which have existed for years, but which have only recently been discovered. David will describe the problems, and explain the techniques used for mitigating them in software — from improvements in the CPU thro

From playlist Kernel Recipes 2018

Video thumbnail

Building a Toy Kitchen

via YouTube Capture

From playlist Random

Video thumbnail

15.2.4 Control Hazards

MIT 6.004 Computation Structures, Spring 2017 Instructor: Chris Terman View the complete course: https://ocw.mit.edu/6-004S17 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP62WVs95MNq3dQBqY2vGOtQ2 15.2.4 Control Hazards License: Creative Commons BY-NC-SA More informat

From playlist MIT 6.004 Computation Structures, Spring 2017

Video thumbnail

Fragmenting Identity

In the Exploratorium, SF

From playlist Exploratorium through your eyes

Video thumbnail

Meltdown and Spectre - Professor Mark Handley, UCL

The Meltdown and Spectre vulnerabilities in almost all modern CPUs have received a great deal of publicity in the last week. Operating systems and hypervisors need significant changes to how memory management is performed, CPU firmware needs updating, compilers are being modified to avoid

From playlist Data science classes

Video thumbnail

MakerBot Mystery Build: Tighten Up

There's some assembly required for this week's print.

From playlist MakerBot Mystery Object

Video thumbnail

DEFCON 20: We Have You by the Gadgets

Speakers: MICKEY SHKATOV | TOBY KOHLENBERG SENIOR INFOSEC SPECIALIST, FORTUNE 500 COMPANY Why send someone an executable when you can just send them a sidebar gadget? We will be talking about the windows gadget platform and what the nastyness that can be done with it, how are gadgets mad

From playlist DEFCON 20

Video thumbnail

15.2.3 Data Hazards

MIT 6.004 Computation Structures, Spring 2017 Instructor: Chris Terman View the complete course: https://ocw.mit.edu/6-004S17 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP62WVs95MNq3dQBqY2vGOtQ2 15.2.3 Data Hazards License: Creative Commons BY-NC-SA More information

From playlist MIT 6.004 Computation Structures, Spring 2017

Video thumbnail

Review: The Red Web by Andrei Soldatov and Irina Borogan

The Reb Web on Amazon: https://www.amazon.com/shop/caspianreport Support CaspianReport on Patreon: https://www.patreon.com/CaspianReport Bitcoin: 1MwRNXWWqzbmsHova7FMW11zPftVZVUfbU Ether: 0xfE4c310ccb6f52f9D220F25Ce76Dec0493dF9aA0 Bitcoin Cash: 1BKLti4Wq4EK9fsBnYWC91caK7NZfUhNw9 BAKU -

From playlist The Bookshelf

Video thumbnail

Kernel Recipes 2018 - Meltdown and Spectre: seeing through the magician’s tricks - Paolo Bonzini

Throughout 2018 several computer vulnerabilities got into the spotlight, possessing all the ingredients needed to attract attention: the core issue was unusually located in the processor rather than the software; almost all personal computers, servers and portable devices were affected to

From playlist Kernel Recipes 2018

Video thumbnail

EEVblog 1426 - WOW! This Problem DROPS Solar Output by 20% !

Dave tracks down why his old 3kW system that was moved was now showing a 20% drop in output power at the same time every day. Is it inverter temperature, inverter mains voltage, solar panel cracking, dodgy connection resistance, or shading? A shorter 5min version of this video is here: ht

From playlist Solar Power Systems

Video thumbnail

Do Not Implement Your Own Crypto Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

4. Assembly Language & Computer Architecture

MIT 6.172 Performance Engineering of Software Systems, Fall 2018 Instructor: Charles Leiserson View the complete course: https://ocw.mit.edu/6-172F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63VIBQVWguXxZZi0566y7Wf Prof. Leiserson walks through the stages of code

From playlist MIT 6.172 Performance Engineering of Software Systems, Fall 2018

Video thumbnail

Trusted Third Party Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

The curious tale of the 1930’s e-Reader | Eric White | TEDxWhitehall

Bob Brown is one of the most important 20th-century media figures you've never heard of. One of his most striking creations was a prototype e-Reader, which he imagined would revolutionise the experience of literature. His idea was too far ahead of its time, but Dr. Eric White picks up his

From playlist TEDxWhitehall 2018: Changing Expectations

Related pages

Meltdown (security vulnerability) | Spectre (security vulnerability)