Dec. 6, 2023, 12:05 p.m. | Black Hat

Black Hat www.youtube.com

We introduce Downfall attacks, new transient execution attacks that undermine the security of computers running everywhere across the internet. We exploit the "Gather" instruction on high-performance Intel CPUs to leak data across boundaries of user-kernel, processes, virtual machines, and trusted execution environments. Our findings, exploitation techniques, and demonstrated attacks defeat all previous defenses, calling for critical hardware fixes and security updates for widely-used client and server computers.

In this talk, we first discuss the SIMD Gather instruction, how to exploit …

attacks computers cpus cutting data data leaks downfall edge environments exploit exploitation findings high intel intel cpus internet kernel leak leaks machines performance processes running security single techniques virtual virtual machines

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States