Daffodil International University
Faculty of Science and Information Technology => Recent Technologies and Trends in Software Engineering => Software Engineering => Cyber and Software Security => Topic started by: maruf.swe on March 30, 2019, 01:20:04 AM
-
(https://media.threatpost.com/wp-content/uploads/sites/103/2018/01/06221914/CPU_Processor-e1551372800619.jpg)
Mitigating Spectre and Meltdown flaws won’t be easy, but experts say exploits targeting Spectre will be hard to patch against.
The race to patch against the Meltdown and Spectre processor vulnerabilities disclosed last week is on. As of today, there are no known exploits in the wild impacting vulnerable Intel, AMD and ARM devices.
Currently, vendors are focused on three main mitigation efforts. Patches that address the Meltdown flaws are KPTI (Kernel Page Table Isolation) and KAISER (Kernel Address Isolation to have Side-channels Efficiently Removed). On Thursday, Google unveiled a Retpoline coding technique for mitigating against Spectre attacks.
For More Details : https://threatpost.com/experts-weigh-in-on-spectre-patch-challenges/129337/ (https://threatpost.com/experts-weigh-in-on-spectre-patch-challenges/129337/)