"Microarchitectural attacks threaten the security of computer systems even in the absence of software vulnerabilities. While x86 and ARM CPUs have been extensively studied, the rising popularity of RISC-V CPUs demands a thorough examination of their microarchitectural attack surface. With the standardization of the RISC-V instruction set architecture and the announcement of support for the architecture by major processor vendors, RISC-V CPUs are on the verge of becoming ubiquitous. In this talk, we will show a systematic investigation of the microarchitectural attack surface on the first commercially-available 64-bit hardware RISC-V CPUs..." https://lnkd.in/escXsGKE
Geraldo Netto’s Post
More Relevant Posts
-
Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers Arm has issued a warning about a security vulnerability, tracked as CVE-2024-4610, affecting its Mali GPU Kernel Driver. The company reported that this use-after-free issue has been actively exploited. Impacted products include all versions of the Bifrost and Valhall GPU Kernel Driver from r34p0 to r40p0. The vulnerability highlights potential risks for local non-privileged users manipulating GPU memory.
To view or add a comment, sign in
-
39 hardware vulnerabilities: A guide to the threats https://trib.al/Wev7pGT
39 hardware vulnerabilities: A guide to the threats
csoonline.com
To view or add a comment, sign in
-
39 hardware vulnerabilities: A guide to the threats
39 hardware vulnerabilities: A guide to the threats
csoonline.com
To view or add a comment, sign in
-
Tired of constant security updates? Discover how partitioning in Arm Cortex-M can simplify device security
One and Done Security
thehackernews.com
To view or add a comment, sign in
-
Arm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it said has been actively exploited in the wild. Tracked as CVE-2024-4610, the use-after-free issue impacts the following products - Bifrost GPU Kernel Driver (all versions from r34p0 to r40p0) Valhall GPU Kernel Driver (all versions from r34p0 to r40p0) "A local non-privileged user can make improper GPU memory
Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers
thehackernews.com
To view or add a comment, sign in
-
#SupplyChainSecurity issues in #firmware are a growing concern, and the impact on #CriticalInfrastructure is alarming. I recently analyzed the UP Xtreme i14 board from AAEON, a common player in advanced industrial and embedded computing platforms. Using our risk.binarly.io platform, I scanned a firmware update for the board released just two months ago (https://lnkd.in/gbkQuQ88). The results? Multiple known vulnerabilities were detected, highlighting a familiar trend of inadequate product security practices among device manufacturers in this space. Unfortunately, this is just scratching the surface of a much larger, escalating problem. #SecureByDesign #ICSsecurity #OTsecurity
To view or add a comment, sign in
-
🚨 GhostWrite is the latest vulnerability affecting T-Head’s XuanTie C910 and C920 CPUs, exposing devices to severe security risks. This hardware flaw allows attackers to bypass isolation, granting them unrestricted access to device memory and peripheral controls. Even basic protections like Docker or sandboxing aren't enough to stop this deterministic attack, which executes in microseconds. Disabling the CPU’s vector extension mitigates the risk but slashes performance by 50%. This presents a critical trade-off between security and functionality. #CyberSecurity #Vulnerability #RISC_V #HardwareSecurity #GhostWrite #Finstein
To view or add a comment, sign in
-
Are you looking to transition your SSUs to Ethernet and PTP? Consider upgrading to a contemporary architecture utilizing Microchip's TimeProvider 4100 grandmaster, now with version 2.4 firmware. This update offers embedded BlueSky™ Firewall Technology, providing robust defense against security vulnerabilities such as jamming and spoofing. Read the News Release on our website. #GPS #1588 #5G #Grandmaster
Are you looking to transition your SSUs to Ethernet and PTP?
To view or add a comment, sign in
-
🔒🚨 Hey tech wizards! Arm just dropped a bomb on us with some juicy security news! 🚨🔒 🔍 Arm is sounding the alarm on a security vulnerability that's shaking up the Mali GPU Kernel Driver world. This bug, known as CVE-2024-4610, is causing quite a stir! 😱 🔥 Brace yourselves - this vulnerability affects products we've grown to love: - Bifrost GPU Kernel Driver (all versions from r34p0 to r40p0) - Valhall GPU Kernel Driver (all versions from r34p0 to r40p0) 🛡️ What's the risk, you ask? Well, a local non-privileged user can maneuver around GPU memory constraints, and that's never good news. Stay sharp, folks! 💪 🔮 Predictions time: With threats evolving like Pokemon, it's clear we need to beef up our defenses. Let's buckle down and secure our tech fortresses before the bad guys come knocking! 🚀 🤓 Who's ready to dive deep into this nerd maelstrom with me? Let's discuss, debate, and decode this vulnerability together! Drop your thoughts below and let's crack this code! 🤖💬 #ainews #automatorsolutions #TechGurusUnite #SecureTheFuture #ArmYourselfWithTech #CybersecurityHeroes #DataProtectionChampions #CyberSecurityAINews ----- Original Publish Date: 2024-06-11 00:21
Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers
thehackernews.com
To view or add a comment, sign in