This whitepaper shows that the security threat from DMPs is significantly worse than previously thought and demonstrates the first end-to-end attacks on security-critical software using the Apple m-series DMP. Undergirding the author's attacks is a new understanding of how DMPs behave which shows, among other things, that the Apple DMP will activate on behalf of any victim program and attempt to leak any cached data that resembles a pointer.
a26af7248f3a7458c6db704eb23699f3163f79dcf78ceedd895d0097eb93941b
FreeBSD Security Advisory - A number of issues relating to speculative execution were found last year and publicly announced January 3rd. Two of these, known as Meltdown and Spectre V2, are addressed here.
64e40208fb8f828b69a524f8d55fae8ef0a49e50ff59ebe4b5a0f73e1dd0d4db
Whitepaper called Meltdown. It discusses how you can bypass Intel's hardware barrier between applications and the computer's core memory.
593ea59090a096211b06194fb5985d5c2ea2b5bd85b540d01802d5d7da2d36f8
Whitepaper called Spectre Attacks: Exploiting Speculative Execution. It discusses how to trick error-free applications into giving up secret information.
d1a3c8c49faea6321bd01e706e0957012c18a94e1a187f1a5477c0e82270dc51
Spectre information disclosure proof of concept exploit that affects multiple CPUs.
473bf133f40fdcb9c9fa158c19b9d4681907d8e8c18230aea02e37e689ee7f95