# CPU Exploitation

Criado por: [Getúlio Victor](https://github.com/GetulioVictor)

Diversos recursos a respeito de materiais de segurança para CPU Exploitation

### Recursos

* [Branch Target Injection (CVE-2017-5715)](https://github.com/qazbnm456/awesome-cve-poc/blob/master/CVE-2017-5715.md)
* [Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practica](https://arxiv.org/pdf/2103.03443)
* [Bypassing Spectre Hardware Defenses to Leak Kernel Data](https://i.blackhat.com/USA-22/Thursday/US-22-Frigo-A-Dirty-Little-History.pdf)
* [Reptar](https://lock.cmpxchg8b.com/reptar.html)
* [Building a RISC-V CPU Core (LFD111x)](https://training.linuxfoundation.org/training/building-a-riscv-cpu-core-lfd111x/)
* [A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs](https://ieeexplore.ieee.org/document/10179399)
* [OpenSecurityTraining2](https://p.ost2.fyi/)
