Fact-checked by Grok 2 weeks ago
References
-
[1]
None### Summary of Retbleed Paper (https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf)
-
[2]
Retbleed: Arbitrary Speculative Code Execution with Return ...Retbleed (CVE-2022-29900 and CVE-2022-29901) is the new addition to the family of speculative execution attacks that exploit branch target injection to leak ...
- [3]
-
[4]
Return Stack Buffer Underflow / CVE-2022-29901, CVE-2022-28693 /...### Summary of Retbleed Vulnerability
-
[5]
Hardware Features and Behaviors Related to Speculative ExecutionSep 13, 2024 · Modern processors use speculative execution to provide higher performance, more efficient resource utilization, and better user experiences. The ...
-
[6]
[PDF] Speculative Execution - Wei Wang“Speculative execution is an optimization technique where a computer system performs some task that may not be needed or should not be executed.” ○ Branch ...
-
[7]
[PDF] Spectre Returns! Speculation Attacks using the Return Stack BufferThe RSB is a hardware stack buffer where the processor pushes the return addresses every time a call instruction is executed and uses that as a return target ...
-
[8]
[PDF] Dynamic Branch Prediction (Continued) Branch Target BufferBranch prediction buffers contain prediction about whether the next branch will be taken (T) or not. (NT), but it does not supply the target PC value. A. Branch ...
-
[9]
[PDF] Branch Target Buffer Design and OptimizationDec 23, 1989 · A Branch Target Buffer (BTB) reduces branch performance penalties by predicting the branch path and caching information, such as branch tags ...
-
[10]
Return stack - Arm DeveloperThe return stack is a three-entry circular buffer used for the prediction of procedure calls and procedure returns. Only unconditional procedure returns are ...Missing: RSB mechanics x86- 64
-
[11]
[PDF] NetBurst™ Micro-Architecture of the Intel PentiumThe Pentium 4 processor employs the following techniques to speed up the execution of memory operations: ▫ speculative execution of loads. ▫ reordering of ...
-
[12]
[PDF] Reverse Engineering of Intel's Branch PredictionSpeculative execution is a key feature in modern processors that leverages multiple mi- croarchitectural elements to optimize runtime performance. This is ...
-
[13]
[PDF] A Systematic Evaluation of Transient Execution Attacks and DefensesAug 14, 2019 · These attacks exploit transient execution to encode secrets through microarchitectural side effects (e.g., cache state) that can later be ...
-
[14]
[PDF] Exploiting Speculative Execution - Spectre AttacksSince speculative execution leaves measurable side effects, this is an extremely powerful means for attackers, for example exposing victim memory even in ...
-
[15]
Branch Target Injection / CVE-2017-5715 / INTEL-SA-00088Jan 3, 2018 · Retpoline is known to be an effective branch target injection mitigation on Intel processors belonging to family 6 (enumerated by the CPUID ...
-
[16]
Meltdown and SpectreCVE-2017-5754 is the official reference to Meltdown. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE. Can I see Meltdown in ...Missing: loads | Show results with:loads
-
[17]
Reading privileged memory with a side-channel - Google Project ZeroJan 3, 2018 · We have discovered that CPU data cache timing can be abused to efficiently leak information out of mis-speculated execution.Missing: timeline | Show results with:timeline
-
[18]
Arm CPU Security Bulletin: Spectre/MeltdownJul 23, 2025 · Variant 3: using speculative memory reads of inaccessible data (CVE-2017-5754) ... loads despite the presence of a dependency (CVE-2018-3639).
-
[19]
comsec-group/retbleed: Arbitrary Speculative Code ... - GitHubWe evaluate the following: Leakage rate with ideal gadgets. Leakage rate with our discovered gadgets; Leaking /etc/shadow. Optimal leakage rate.Missing: bits probe
-
[20]
Arm CPU Security Update: Retpoline Return InstructionsMar 14, 2025 · CPUs that are vulnerable to Spectre variant 2 using indirect branches could also be vulnerable to RETBLEED using return instructions. Arm ...
-
[21]
Affected Processors: Transient Execution Attacks & Related Security...Review the impact of transient execution attacks and select security issues on currently supported Intel products.
- [22]
-
[23]
Retbleed security vulnerability affecting Skylake processors used in ...This vulnerability affects Intel Skylake-SP "1st Generation Intel Xeon Scalable Processor" used in some Teradata platforms.
-
[24]
AMD CPU Branch Type Confusion### Summary: Retbleed for AMD
-
[25]
Following Retbleed, The Combined CPU Security Mitigation Impact ...Sep 6, 2022 · As a reminder, Retbleed on the AMD side affects only Zen 2 CPUs and older -- not current generation Zen 3 or the upcoming Zen 4 processors.
-
[26]
[PDF] Arbitrary Speculative Code Execution with Return InstructionsAug 12, 2022 · Retbleed is a Spectre-BTI attack that leaks kernel memory by exploiting return instructions to gain arbitrary kernel-level speculative code ...
-
[27]
[PDF] RETBLEED: Arbitrary Speculative Code Execution with Return ...Jul 12, 2022 · Modern CPUs rely on speculative execution of code to improve the overall performance by reducing stalling. The BPU, located early in the ...Missing: explanation | Show results with:explanation
-
[28]
Return Address Security Bulletin - AMD“Zen 3” and “Zen 4” based systems will require the µcode patch, which is incorporated in the BIOS update, prior to enabling OS configuration options. Datacenter.Missing: 5 | Show results with:5
-
[29]
New working speculative execution attack sends Intel and AMD ...Jul 12, 2022 · Their Retbleed proof-of-concept works against Intel CPUs with the Kaby Lake and Coffee Lake microarchitectures and AMD Zen 1, Zen 1+, and Zen 2 ...
-
[30]
AMD, Intel chips vulnerable to 'Retbleed' Spectre variantJul 12, 2022 · Older AMD and Intel chips are vulnerable to yet another Spectre-based speculative-execution attack that exposes secrets within kernel memory despite defenses ...
-
[31]
Retpoline: A Branch Target Injection Mitigation - IntelAug 22, 2022 · The indirect branch predictor uses information about previously-executed branches to predict the destinations of future indirect branches.
-
[32]
Stuffing the return stack buffer - LWN.netJul 22, 2022 · In recent Intel processors, there is a special hidden data structure called the "return stack buffer" (RSB) that caches return addresses for speculation.
-
[33]
RSB-related mitigations - The Linux Kernel documentationIf a RET is executed when the RSB buffer is empty due to mismatched CALLs/RETs or returning from a deep call stack, the branch predictor can fall back to using ...
-
[34]
Microsoft Touts HyperClear Protection Against RETbleed and Other ...2022年7月21日 · Microsoft announced on Tuesday that its HyperClear technology used with its Hyper-V hypervisor offers protections against new speculative ...
- [35]
-
[36]
Benchmarking The Linux Mitigated Performance For RetbleedJul 13, 2022 · In the Retbleed whitepaper by ETH Zurich COMSEC researchers, they characterized the mitigations as result in 14~39% overhead.Missing: IPC loss
-
[37]
Retbleed Vulnerability Exploited to Access Any Process's Memory ...Aug 8, 2025 · Security researchers have successfully demonstrated a sophisticated exploit of the Retbleed vulnerability, a critical CPU security flaw.Missing: core | Show results with:core
-
[38]
ESXi VM Performance Tanks Up To 70% Due To Intel Retbleed ...Sep 9, 2022 · VMware's performance engineering team today announced a performance regression in Linux 5.19 affecting compute performance up to -70%, ...
-
[39]
VMware: 70% drop in Linux ESXi VM performance with Retbleed fixesSep 12, 2022 · VMware is warning that ESXi VMs running on Linux kernel 5.19 can have up to a 70% performance drop when Retbleed mitigations are enabled compared to the Linux ...Missing: enhancements | Show results with:enhancements
-
[40]
The 'Retbleed' speculative execution vulnerabilities - LWN.netJul 12, 2022 · Our performance evaluation shows that mitigating Retbleed has unfortunately turned out to be expensive: we have measured between 14% and 39% ...
-
[41]
Retbleed Vulnerability Allows Arbitrary Memory Access on Modern ...Aug 8, 2025 · The vulnerability exploits speculative execution in CPU return instructions, allowing attackers to read all data in host physical memory.
-
[42]
Blog: Exploiting Retbleed in the real world - Live Threat IntelligenceAug 7, 2025 · It was initially disclosed in 2022 and allows attackers to leak sensitive information by exploiting the way CPUs predict return addresses during ...
-
[43]
[PDF] Exploiting Inaccurate Branch History in Side-Channel AttacksThis paper examines history-based branch prediction and assesses potentially vulnerable behaviors inad- vertently implemented in processors. Through extensive ...
-
[44]
Known Exploited Vulnerabilities Catalog | CISACISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their ...Missing: speculative | Show results with:speculative
-
[45]
[PDF] Machine Learning and Side-Channel Attacks on Post-Quantum ...Multiple side-channel studies have demonstrated key recovery through power analysis and deep learning profiling attacks [15,23,28]. • CRYSTALS-Dilithium: A ...
-
[46]
GateBleed: Exploiting On-Core Accelerator Power Gating for High ...Oct 17, 2025 · To the authors' knowledge, this is the first side-channel attack on AI privacy that exploits hardware accelerator power optimizations.
-
[47]
A Comprehensive Survey of Side-Channel Attacks on Memory - arXivMay 8, 2025 · This work aims to provide a comprehensive overview of memory-based side-channel attacks with the goal of providing significant insights for researchers and ...