More Information on RAMBleed

ID 标签 767608
已更新 6/10/2019
版本 Latest
公共

author-image

作者

In June 2019, researchers from the University of Michigan, Graz University of Technology in Austria, and the University of Adelaide in Australia published details and a proof of concept exploit they called "RAMBleed" (CVE-2019-0174).

Systems using DRAM modules mitigated against Rowhammer-style attacks remain protected from RAMBleed. Additionally, the researchers note that memory encryption, including Intel® Software Guard Extensions (Intel® SGX), can be used to protect systems from RAMBleed attacks.

Protecting our customers and their data continues to be a critical priority for Intel, and we appreciate the efforts of the security community for their ongoing research.

 

Software Security Guidance Home | Advisory Guidance | Technical Documentation | Best Practices | Resources

 

"