Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Spectre in the Real World - Leaking Your Private Data from the Cloud with CPU Vulnerabilities

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how transient execution CPU vulnerabilities like Spectre can be exploited in real-world cloud environments to bypass virtual machine isolation and leak sensitive data across VM boundaries. This 45-minute conference talk from 39C3 demonstrates a practical attack against a major public cloud provider that earned a $151,515 bug bounty - Google Cloud's highest bounty at the time. Explore the evolution of Spectre attacks since their 2018 discovery and understand why these vulnerabilities pose unique challenges for cloud providers who offer "remote code execution as a service" on shared hardware. Examine how attackers can silently extract secret data from neighboring virtual machines despite deployed software mitigations, effectively defeating the isolation that cloud customers rely on. Discover the coordinated disclosure process, current mitigation strategies, and potential future defenses against these sophisticated CPU-level attacks. Gain insights into why transient execution vulnerabilities represent a more significant threat in cloud environments compared to traditional computing scenarios, and understand the technical details behind bypassing existing protections in shared cloud infrastructure.

Syllabus

39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities

Taught by

media.ccc.de

Reviews

Start your review of Spectre in the Real World - Leaking Your Private Data from the Cloud with CPU Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.