Security Vulnerabilities
Spectre Variants
Meltdown Attack
Foreshadow Attack
MDS Attacks
Flush+Reload
Prime+Probe
Evict+Time
Rowhammer Attacks
Cold Boot Attacks
Memory Bus Snooping
DMA Attacks
Simple Power Analysis (SPA)
Differential Power Analysis (DPA)
Cache Timing Attacks
Network Timing Attacks
Secure Boot Bypass
UEFI Rootkits
SMM Vulnerabilities
BadUSB Attacks
USB Rubber Ducky
USB Killer Devices
Previous
7. Network and Protocol Vulnerabilities
Go to top
Next
9. Vulnerability Discovery and Assessment Methodologies