像VirtualBox这样的虚拟机是否可能具有“ spectre”安全漏洞?我认为VM可能执行了乱序执行,但我认为不可能窥视缓存以读取结果。
是否有任何解释说明如何读取虚拟cpu的缓存?
Spectre works on a different level ... In this attack, the attacker tricks the speculative execution to predictively execute instructions erroneously. In a nutshell, the predictor is coerced to predict a specific branch result that results in asking for an out-of-bound memory access that the victim process would not normally have requested resulting in incorrect speculative execution. Then by the side-channel, retrieves the value of this memory. In this way memory belonging to the victim process is leaked to the malicious process.
qemu
可以进行仿真,因为它不是硬件 CPU,所以会更安全,但它速度慢得多,并且与虚拟化不同。