This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links
FLUSH+RELOAD...nobody

Version management

Difference between version and

At line 1 added 14 lines
!!! Overview
[{$pagename}] is a [Side-channel attack] is an L3 [cache] which you place 'probes' on [cache] lines in the code segment of shared binaries, which get 'triggered' any time any [Processes] on the system loads that line into [cache] (i.e. the code was executed) which in effect allows an [Observer] to see which code other [processes] are executing.
[{$pagename}] has so far been used successfully to break [cryptography] including
* [AES] in [OpenSSL]
* [RSA] in GnuPG
* [ECDSA] in [OpenSSL]
* and lots more.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [flush-reload-attacks|https://github.com/defuse/flush-reload-attacks|target='_blank'] - based on information obtained 2017-06-28-