Lines Matching refs:attack
69 The bounds check bypass attack :ref:`[2] <spec_ref2>` takes advantage
92 The branch target injection attack takes advantage of speculative
116 the attack revealing useful data.
118 One other variant 2 attack vector is for the attacker to poison the
123 return instructions. This attack can be mitigated by flushing the return
137 The following list of attack scenarios have been anticipated, but may
138 not cover all possible attack vectors.
149 a pointer for a Spectre variant 1 attack. The index or pointer
182 become visible via an L1 side channel attack.
184 A similar attack exists when coming from kernel space. The CPU can
192 target buffer (BTB) before issuing syscall to launch an attack.
213 Spectre variant 2 attack by a rogue user process. To mitigate such
220 A malicious user process can try to attack another user process,
262 The attack mechanism is similar to how user processes attack the
288 A rogue guest may attack another guest to get data accessible by the
341 and there is no guarantee that all possible attack vectors for Spectre
349 attack between user processes:
427 not cover all attack vectors for Spectre variant 1.
492 also prevent the program from launching a variant 2 attack
512 1 attack vectors.