Google publishes “Leaky.Page” showing Specter in action in web browsers



[ad_1]

GOOGLE -

Google has released its proof of concept code showing the practicality of Specter exploits in modern web browser JavaScript engines. The code is available and you can even try it yourself on the leaky.page website.

Google’s Leaky.Page code shows that it is possible to leak data at around 1KB / s when running their Chrome web browser on a Skylake processor. The proof of concept code is for Intel Skylake processors, while it should also work for other processors and browsers with minor JavaScript changes. Google also managed to execute this Leaky.Page attack on Apple M1 ARM processors without any major changes.

Google has also prototyped code capable of leaking data at a rate of 8 KB / s but with less stability. On the other side, they have proof of concept code using JavaScript timers that can leak at 60B / s.

Google’s Leaky.Page PoC is a Specter V1 gadget which is a JavaScript array that is speculatively accessed out of bounds. While the V1 gadget can be mitigated at the software level, the Chrome V8 team has determined that other gadgets such as the Specter Variant 4 are “just not feasible in software” for mitigation.

More details on the latest findings from Google Specter via the Google Security Blog. The Specter proof of concept code can be found at leaky.page.

This week, the W3C released a draft of recommendations from web developers on Specter.

[ad_2]

Source link