By monitoring the state of page table mappings, a privileged attacker can reconstruct the access patterns of the victim.
Description
By monitoring the state of page table mappings, a privileged attacker can reconstruct the access patterns of the victim.CWE
CVE
Attack Surfaces
Priviledged Mode (MITRE EMB3D PID-11)
Attack Vectors
Code Execution (MITRE EMB3D TID-301)
Defenses
constant-time code, make memory accesses independent of secrets
remove privileges, make page table management a responsibility of the victim's domain