More Information on RAMBleed

Published: 06/10/2019

In June 2019, researchers from the University of Michigan, Graz University of Technology in Austria, and the University of Adelaide in Australia published details and a proof of concept exploit they called "RAMBleed" (CVE-2019-0174).

Systems using DRAM modules mitigated against Rowhammer-style attacks remain protected from RAMBleed. Additionally, the researchers note that memory encryption, including Intel® Software Guard Extensions (Intel® SGX), can be used to protect systems from RAMBleed attacks.

Protecting our customers and their data continues to be a critical priority for Intel, and we appreciate the efforts of the security community for their ongoing research.

 

Software Security Guidance Home | Advisory Guidance | Technical Documentation | Best Practices | Resources

 

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.