
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mechanism was believed to completely eliminate the ability to train a branch predictor using code from multiple privileged domains. However, the authors demonstrated that even with a flawless implementation of these mechanisms, an attacker can exploit the same domain , such as the system kernel, to independently train a predictor and extract sensitive data. The study describes three new types of Spectre-v2 attacks based on so-called “self-training,” in which both training and speculative execution occur in the same










