When Jann Horn of Google’s Project Zero posted a detailed blog titled “Reading privileged memory with a side-channel,” it set off a firestorm of activity as the post confirmed that secret information inside a computer could be accessed via two different attacks, Meltdown and Spectre. Essentially, both attacks utilize CPU data cache timing to efficiently exploit and leak information from the system. This could lead to – at worst – arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.

Download this white paper to:

  • Learn about Meltdown and Spectre
  • Understand how the Rambus CryptoManager Root of Trust can mitigate the risk of processor attacks by providing a trusted foundation for secure processing in the core and system

Get the white paper by completing the form.

Protecting Computing Systems in a Post-Meltdown/Spectre World