Computer scientists at ETH Zurich discover new class of vulnerabilities in Intel processors, allowing them to break down barriers between different users of a processor using carefully crafted instruction sequences. Entire processor memory can be read by employing quick, repeated attacks.
The new class of vulnerabilities in Intel processors arises from speculative technologies that anticipate individual computing steps.
Openings enable gradual reading of entire privilege memory contents of shared processor (CPU).
All Intel processors from the last 6 years are affected, from PCs to servers in data centres.
Anyone having a link to a more technical (detailed) description?
This is quite novice orientated and I'd be very interested on how it actually works. Is there anything already disclosed?