snaggen

joined 2 years ago
 

fjärrinlägg från: https://lemmyrs.org/post/154420

Ruffle, a Flash Player emulator built in Rust, is being used on archive.org to allow modern browsers access to classics like n, All Your Base, Weebl and Bob, Strong Bag Emails, Happy Tree Friends and many more.

Jason Scott writes:

Thanks to efforts by volunteers Nosamu and bai0, the Internet Archive's flash emulation just jumped generations ahead.

Mute/Unmute works. The screen resizes based on the actual animation's information. And for a certain group who will flip their lid:

We can do multi-swf flash now!

A pile of previously "broken" flashes will join the collection this week.

 

Quoting https://hachyderm.io/@TehPenguin/110702383979537745

If you want to check if it's enabled on your device, you can use Process Explorer to check if win32kbase_rs.sys has been loaded into the System process.

 

Abstract—Microarchitectural attacks threaten the security of computer systems even in the absence of software vulnerabil- ities. Such attacks are well explored on x86 and ARM CPUs, with a wide range of proposed but not-yet deployed hardware countermeasures. With the standardization of the RISC-V instruction set architecture and the announcement of support for the architecture by major processor vendors, RISC-V CPUs are on the verge of becoming ubiquitous. However, the microarchitectural attack surface of the first commercially- available RISC-V hardware CPUs still needs to be explored. This paper analyzes the two commercially-available off-the- shelf 64-bit RISC-V (hardware) CPUs used in most RISC-V systems running a full-fledged commodity Linux system. We evaluate the microarchitectural attack surface and introduce 3 new microarchitectural attack techniques: Cache+Time, a novel cache-line-granular cache attack without shared memory, Flush+Fault exploiting the Harvard cache architecture for Flush+Reload, and CycleDrift exploiting unprivileged access to instruction-retirement information. We also show that many known attacks apply to these RISC-V CPUs, mainly due to non-existing hardware countermeasures and instruction-set subtleties that do not consider the microarchitectural attack surface. We demonstrate our attacks in 6 case studies, includ- ing the first RISC-V-specific microarchitectural KASLR break and a CycleDrift-based method for detecting kernel activity. Based on our analysis, we stress the need to consider the microarchitectural attack surface during every step of a CPU design, including custom ISA extensions.

view more: ‹ prev next ›