Spectre in the Real World - Leaking Your Private Data from the Cloud with CPU Vulnerabilities
media.ccc.de via YouTube
-
32
-
- Write review
Launch Your Cybersecurity Career in 6 Months
AI Engineer - Learn how to integrate AI into software applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how transient execution CPU vulnerabilities like Spectre can be exploited in real-world cloud environments to bypass virtual machine isolation and leak sensitive data across VM boundaries. This 45-minute conference talk from 39C3 demonstrates a practical attack against a major public cloud provider that earned a $151,515 bug bounty - Google Cloud's highest bounty at the time. Explore the evolution of Spectre attacks since their 2018 discovery and understand why these vulnerabilities pose unique challenges for cloud providers who offer "remote code execution as a service" on shared hardware. Examine how attackers can silently extract secret data from neighboring virtual machines despite deployed software mitigations, effectively defeating the isolation that cloud customers rely on. Discover the coordinated disclosure process, current mitigation strategies, and potential future defenses against these sophisticated CPU-level attacks. Gain insights into why transient execution vulnerabilities represent a more significant threat in cloud environments compared to traditional computing scenarios, and understand the technical details behind bypassing existing protections in shared cloud infrastructure.
Syllabus
39C3 - Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities
Taught by
media.ccc.de