Vulnerabilities
Spectre
Also known as: Speculative execution attack
Definition
A family of microarchitectural attacks that abuse CPU speculative execution to leak data across security boundaries via cache-based side channels.
Examples
- Spectre v1 (Bounds Check Bypass) leaking kernel memory from user processes.
- Spectre v2 (Branch Target Injection) crossing VM boundaries in cloud environments.
Related terms
Meltdown
A microarchitectural vulnerability (CVE-2017-5754) that lets unprivileged code read kernel memory by exploiting out-of-order execution and a delayed permission check.
Side-Channel Attack
An attack that recovers secrets from a system by observing physical or implementation characteristics — timing, power, electromagnetic emissions, caches, acoustic signals — rather than logical flaws.
Timing Attack
A side-channel attack that recovers secret information by measuring how long an operation takes under different inputs.
Rowhammer
A hardware vulnerability in DRAM where repeatedly activating one memory row causes bit flips in physically adjacent rows, undermining memory integrity.
Vulnerability
A weakness in a system, application, or process that an attacker can exploit to violate confidentiality, integrity, or availability.
CVE (Common Vulnerabilities and Exposures)
A public catalogue that assigns a unique identifier to each disclosed software or hardware vulnerability so they can be referenced unambiguously across the industry.