Announcement

Collapse
No announcement yet.

Intel CET Indirect Branch Tracking Submitted For Linux 5.18

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Intel CET Indirect Branch Tracking Submitted For Linux 5.18

    Phoronix: Intel CET Indirect Branch Tracking Submitted For Linux 5.18

    Indirect Branch Tracking (IBT) that is part of Intel's Control-Flow Enforcement Technology (CET) found with Tiger Lake CPUs and newer is landing for the Linux 5.18 kernel...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    I wonder how long it will take until someone discovers that IBT/CET is broken beyond repair?

    Comment


    • #3
      Originally posted by milkylainen View Post
      I wonder how long it will take until someone discovers that IBT/CET is broken beyond repair?
      I've heard it variously described as security snake oil to the greatest thing since sliced bread. I'm waiting to see how fast skilled hackers find a way around it. Maybe it's good, maybe not. Security isn't about perfection, just making it that much harder for people to get around security barriers. However, if we see simple exploits being deployed by script kiddies in a year or two we'll know it's more snake oil.

      Comment


      • #4
        Originally posted by stormcrow View Post

        I've heard it variously described as security snake oil to the greatest thing since sliced bread. I'm waiting to see how fast skilled hackers find a way around it. Maybe it's good, maybe not. Security isn't about perfection, just making it that much harder for people to get around security barriers. However, if we see simple exploits being deployed by script kiddies in a year or two we'll know it's more snake oil.
        Highly unlikely. There hasn't been a single easy to use "script kiddie proof" exploit based on speculation attacks. I'm not trying to say they aren't possible, but doing so is hard enough that you just can't easily package them like other vulnerabilities

        Comment


        • #5
          We're one step closer to an optimized COME FROM for INTERCAL.

          Comment

          Working...
          X