I always find security flaws and malware very interesting, but I struggle to find in-depth explanations on how a system is being exploited by an attacker. For example, Tom's Hardware's article on the new Spectre flaw published today doesn't tell you more than there is some exploit to a processor's speculative instruction execution that allows for buffer overflow attacks.
Ideally, I would love to read something about how the out-of-order execution nature of these processors is exploited. How is the TLB overflowed? What is an example of assembly code that would overflow the TLB and how does the state of the TLB change through each line?
I'm really not looking for how to recreate the exploit (although it may sound like it lol), just something that could describe these flaws in a more academic sense. Do you guys know any websites, bloggers, journals, etc. that go into more details on security flaws like Spectre v.1,2 or WannaCry or the WPA2 exploit?
Ideally, I would love to read something about how the out-of-order execution nature of these processors is exploited. How is the TLB overflowed? What is an example of assembly code that would overflow the TLB and how does the state of the TLB change through each line?
I'm really not looking for how to recreate the exploit (although it may sound like it lol), just something that could describe these flaws in a more academic sense. Do you guys know any websites, bloggers, journals, etc. that go into more details on security flaws like Spectre v.1,2 or WannaCry or the WPA2 exploit?