Leaking /etc./shadow from userspace by manipulating Intel branch predictors [pdf]

2 WJW 1 5/22/2025, 8:59:54 AM comsec.ethz.ch ↗

Comments (1)

WJW · 6h ago
Super wild hack. Because the branch predictor tables are updated asynchronously, you can SYSCALL into the kernel and get it to speculatively load privileged memory. Then afterwards it is possible to leak this memory by using already known SPECTRE type attacks and use that information to extract arbitrary memory, like the contents of /etc/shadow. This is pretty magical.