Home
Description
XiangShan Nanhu V2 and XiangShan Kunmighu V3 were discovered to use speculative execution and indirect branch prediction, allowing attackers to access sensitive information via side-channel analysis of the data cache.
References
github.com/necst/aca25-xiangshan-spectre/blob/main/README.md
github.com/necst/aca25-xiangshan-spectre