Javascript exploit + Inclusive cache architecture = boom?

Idontcare

Elite Member
Oct 10, 1999
21,110
64
91
The exploit then records the time it takes for the victim’s PC to run various operations in the cache memory, using the browser’s own high-resolution timers (we’re talking nanoseconds here). By studying the time it takes for memory access to take place, the hacker can get an accurate picture about a user’s browser history, keystrokes and mouse movements. The attack is more for spying than theft: it doesn’t steal any data or passwords or corrupt the victim’s machine.

Oh my, they will know when I move my mouse or if my browser's cache is full :eek: Better unplug right now!
 

DrMrLordX

Lifer
Apr 27, 2000
23,204
13,289
136
Well, according to the bit you quoted, it can lift browser history and keystrokes which is potentially pretty bad.

The part that was interesting to me is that without inclusive cache hierarchy, it doesn't work.