tags:spectrerace_conditionside_channeluaf original link: Ghostrace: Exploiting and Mitigating Speculative Race Conditions newsletter link: exploits.club Weekly Newsletter 12


Exploits Club Summary:

VUSec released a blog post with the key takeaways from their recently released paper . The research they conducted centered around synchronization primitives, and their behavior in speculatively executed code paths. The team found that “primitives implemented using conditional branches can be microarchitecturally bypassed on speculative paths using a Spectre-v1 attack, turning all architecturally race-free critical regions into Speculative Race Conditions (SRCs), allowing attackers to leak information from the target software.”