{"id":25374,"date":"2019-02-18T07:05:06","date_gmt":"2019-02-18T07:05:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/"},"modified":"2019-02-18T07:05:06","modified_gmt":"2019-02-18T07:05:06","slug":"data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/","title":{"rendered":"Data-spewing Spectre chip flaws can&#8217;t be killed by software alone, Google boffins conclude"},"content":{"rendered":"<p>Google security researchers have analyzed the impact of the data-leaking Spectre vulnerabilities afflicting today&#8217;s processor cores, and concluded software alone cannot prevent exploitation.<\/p>\n<p>The Chocolate Factory brainiacs \u2013 Ross Mcilroy, Jaroslav Sevcik, Tobias Tebbi, Ben L. Titzer, Toon Verwaest \u2013 show that they can construct what&#8217;s dubbed a universal gadget to exploit <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/05\/spectre_flaws_explained\/\">the spectre gang of speculative-execution flaws<\/a> present in various CPU families, allowing attacker-supplied code running in a thread to read all memory in the same address space.<\/p>\n<p>This means, for example, a malicious webpage&#8217;s JavaScript code executing in a web browser thread can potentially snoop on another webpage&#8217;s JavaScript running in another thread, and steal secret data from that other page. There are already mitigations in place in browsers, such as Chrome&#8217;s <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.chromium.org\/Home\/chromium-security\/site-isolation\">Site Isolation<\/a> that keeps webpages in separate processes, limiting what any malicious JavaScript can spy on. Firefox, Internet Explorer, and Edge, at least, block the use of JS object <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/SharedArrayBuffer\">SharedArrayBuffer<\/a>, which can be exploited to perform Spectre snooping.<\/p>\n<p>However, the underlying threat is still there for any applications interpreting attacker-supplied code. Language-based defenses and similar safeguards within a process can&#8217;t stop Spectre; you have to go down to hardware-based separation using individual processes with their own individual virtual address spaces and hardware-enforced page tables.<\/p>\n<h3 class=\"crosshead\"><span>Threat or hype?<\/span><\/h3>\n<p>Since there aren&#8217;t many other scenarios in which attacker-supplied code is interpreted in the same address space as other user-supplied code \u2013 web browsers spring to mind, chiefly \u2013 the Googlers&#8217; research is largely academic, and not something to immediately panic over. However, if you&#8217;re developing software that interprets external code, this is something to be very much aware of.<\/p>\n<p>&#8220;We now believe that speculative vulnerabilities on today\u2019s hardware defeat all language-enforced confidentiality with no known comprehensive software mitigations, as we have discovered that untrusted code can construct a universal read gadget to read all memory in the same address space through side-channels,&#8221; the researchers say in a paper distributed through pre-print service ArXiv.<\/p>\n<p>The paper is titled &#8220;<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/arxiv.org\/abs\/1902.05178\">Spectre is here to stay: An analysis of side-channels and speculative execution<\/a>.&#8221;<\/p>\n<p>Shortly after <em>The Register<\/em> <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/04\/intel_amd_arm_cpu_vulnerability\/\">first reported<\/a> the Spectre and Meltdown bugs in January 2018, University of Michigan assistant professor of computer science Daniel Genkin, a co-author of the original Spectre research paper who was a postdoctoral student at the time, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/05\/spectre_flaws_explained\/?page=1\">said<\/a> as much: &#8220;We are currently not aware of effective countermeasures that will eliminate the root cause of Spectre, short of hardware redesign,&#8221; he told <em>The Register<\/em> last year.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/08\/14\/shutterstock_spectre.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Spooky computer chips\"\/><\/p>\n<h2 title=\"Handy for smuggling expensive zero-days onto targets and executing them, without antivirus realizing\">Intel SGX &#8216;safe&#8217; room easily trashed by white-hat hacking marauders<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/02\/12\/intel_sgx_hacked\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Spectre, as its name suggests, involves the exploitation of speculative execution, a feature of modern processors that involves guessing the future path of a program and making anticipated calculations while the processor is busy with other tasks.<\/p>\n<p>These calculations can be retained if the correct path was guessed, which saves time and hastens code execution. But as the Spectre flaws demonstrated, the ability to peer into the future can be abused.<\/p>\n<p>There are several Spectre variants but the basic problem is that chip designers traded security for speed. &#8220;Our models, our mental models, are wrong; we have been trading security for performance and complexity all along and didn\u2019t know it,&#8221; the researchers observe.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/05\/21\/spectre_meltdown_v4_microsoft_google\/\">Variant 4<\/a>, Speculative Aliasing Confusion, has no software solution that Google&#8217;s researchers could find. &#8220;Variant 4 defeats everything we could think of,&#8221; the researchers say.<\/p>\n<p>Initially, software and hardware makers pushed fixes like microcode updates and techniques like <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/security.googleblog.com\/2018\/01\/more-details-about-mitigations-for-cpu_4.html\">Retpoline<\/a>. Browser makers Google and Mozilla made timing data less accessible, to make speculative execution attacks more difficult.<\/p>\n<p>But that appears to be futile. &#8220;We argue that mitigating timing channels by manipulating timers is impossible, nonsensical, and in any case ultimately self-defeating,&#8221; the researchers say.<\/p>\n<p>Google&#8217;s boffins added defenses against Spectre into the V8 JavaScript virtual machine within the company&#8217;s Chrome browser and found the performance penalties frustrating because they slow things down without truly fixing the problem. &#8220;None of these mitigations provide comprehensive protection against Spectre, and so the mitigation space is a frustrating performance \/ protection trade-off,&#8221; they say.<\/p>\n<p>That&#8217;s why Google shifted its browser security focus to the aforementioned <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/security.googleblog.com\/2018\/07\/mitigating-spectre-with-site-isolation.html\">site isolation<\/a>. But help has to come from hardware, too, in the form of better process isolation.<\/p>\n<p>Intel announced hardware fixes for some of the Spectre vulnerabilities in March 2018, but its claim that Spectre Variant 1 &#8220;will continue to be addressed via software mitigations&#8221; now looks rather dubious. \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/02\/18\/spectre_cant_be_killed\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While browsers have got their act together, any other apps interpreting user-supplied code need to be aware of this Google security researchers have analyzed the impact of the data-leaking Spectre vulnerabilities afflicting today&#8217;s processor cores, and concluded software alone cannot prevent exploitation.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-25374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data-spewing Spectre chip flaws can&#039;t be killed by software alone, Google boffins conclude 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data-spewing Spectre chip flaws can&#039;t be killed by software alone, Google boffins conclude 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-18T07:05:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Data-spewing Spectre chip flaws can&#8217;t be killed by software alone, Google boffins conclude\",\"datePublished\":\"2019-02-18T07:05:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/\"},\"wordCount\":755,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/\",\"name\":\"Data-spewing Spectre chip flaws can't be killed by software alone, Google boffins conclude 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg\",\"datePublished\":\"2019-02-18T07:05:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data-spewing Spectre chip flaws can&#8217;t be killed by software alone, Google boffins conclude\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data-spewing Spectre chip flaws can't be killed by software alone, Google boffins conclude 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/","og_locale":"en_US","og_type":"article","og_title":"Data-spewing Spectre chip flaws can't be killed by software alone, Google boffins conclude 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-18T07:05:06+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Data-spewing Spectre chip flaws can&#8217;t be killed by software alone, Google boffins conclude","datePublished":"2019-02-18T07:05:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/"},"wordCount":755,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/","url":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/","name":"Data-spewing Spectre chip flaws can't be killed by software alone, Google boffins conclude 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg","datePublished":"2019-02-18T07:05:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/data-spewing-spectre-chip-flaws-cant-be-killed-by-software-alone-google-boffins-conclude\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data-spewing Spectre chip flaws can&#8217;t be killed by software alone, Google boffins conclude"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25374"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25375"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}