Lines Matching refs:attack
56 similar to the Meltdown attack.
59 allows to attack any physical memory address in the system and the attack
60 works across all protection domains. It allows an attack of SGX and also
73 application to attack the physical memory to which these PTEs resolve.
78 The Linux kernel contains a mitigation for this attack vector, PTE
92 PTE inversion mitigation for L1TF, to attack physical host memory.
98 only to attack data which is present in L1D, a malicious guest running
99 on one Hyperthread can attack the data which is brought into the L1D by
103 If the processor does not support Extended Page Tables, the attack is
107 While solutions exist to mitigate these attack vectors fully, these
173 To make sure that a guest cannot attack data which is present in the L1D
224 the same physical core then they can only attack their own memory and
258 which run untrusted guests, reduces the attack vector space.
510 are not running any other processes, can reduce the attack surface
517 Isolating the guest CPUs from interrupts can reduce the attack surface
527 certain degree, but the risk of the remaining attack surface has to be
605 impossible that L1TF can be exploited via the most popular attack