This HTML5 document contains 60 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n14https://lviattack.eu/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n4http://dbpedia.org/resource/File:
n18https://global.dbpedia.org/id/
n12https://software.intel.com/security-software-guidance/insights/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
dbpedia-fihttp://fi.dbpedia.org/resource/
n10http://commons.wikimedia.org/wiki/Special:FilePath/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Load_value_injection
rdf:type
owl:Thing
rdfs:label
Load value injection
rdfs:comment
Load value injection (LVI) is an attack on Intel microprocessors that can be used to attack Intel's Software Guard Extensions (SGX) technology. It is a development of the previously known Meltdown security vulnerability. Unlike Meltdown, which can only read hidden data, LVI can inject data values, and is resistant to the countermeasures so far used to mitigate the Meltdown vulnerability.
rdfs:seeAlso
dbr:Transient_execution_CPU_vulnerability
foaf:homepage
n14:
dbp:name
Load value injection
foaf:depiction
n10:Load_Value_Injection_logo.svg
dcterms:subject
dbc:Side-channel_attacks dbc:Hardware_bugs dbc:Speculative_execution_security_vulnerabilities dbc:X86_architecture dbc:X86_memory_management dbc:Intel_x86_microprocessors dbc:2020_in_computing
dbo:wikiPageID
63344217
dbo:wikiPageRevisionID
1095445137
dbo:wikiPageWikiLink
n4:Load_Value_Injection_logo.svg dbr:Intel dbr:Memory_barrier dbr:Meltdown_(security_vulnerability) dbc:X86_architecture dbc:X86_memory_management dbr:Instruction_(computing) dbc:Hardware_bugs dbc:Speculative_execution_security_vulnerabilities dbr:Microprocessor dbr:Software_Guard_Extensions dbr:Transient_execution_CPU_vulnerabilities dbr:Intel_microprocessors dbc:Side-channel_attacks dbc:Intel_x86_microprocessors dbc:2020_in_computing
dbo:wikiPageExternalLink
n12:deep-dive-load-value-injection n14:
owl:sameAs
wikidata:Q87473867 n18:Bz4N3 dbpedia-fi:Load_Value_Injection
dbp:wikiPageUsesTemplate
dbt:Start_date_and_age dbt:CVE dbt:Reflist dbt:Short_description dbt:Infobox_bug dbt:See_also dbt:As_of dbt:Speculative_execution_exploits
dbo:thumbnail
n10:Load_Value_Injection_logo.svg?width=300
dbp:caption
Logo for the Load Value Injection security vulnerability
dbp:website
n14:
dbo:abstract
Load value injection (LVI) is an attack on Intel microprocessors that can be used to attack Intel's Software Guard Extensions (SGX) technology. It is a development of the previously known Meltdown security vulnerability. Unlike Meltdown, which can only read hidden data, LVI can inject data values, and is resistant to the countermeasures so far used to mitigate the Meltdown vulnerability. In theory, any processor affected by Meltdown may be vulnerable to LVI, but as of March 2020, LVI is only known to affect Intel microprocessors. Intel has published a guide to mitigating the vulnerability by using compiler technology, requiring existing software to be recompiled to add <a href="/wiki/LFENCE" class="mw-redirect" title="LFENCE">LFENCE</a> memory barrier instructions at every potentially vulnerable point in the code. However, this mitigation appears likely to result in substantial performance reductions in the recompiled code.
dbp:affectedHardware
Intel x86 microprocessors
prov:wasDerivedFrom
wikipedia-en:Load_value_injection?oldid=1095445137&ns=0
dbo:wikiPageLength
3911
foaf:isPrimaryTopicOf
wikipedia-en:Load_value_injection
Subject Item
dbr:CVE-2020-0551
dbo:wikiPageWikiLink
dbr:Load_value_injection
dbo:wikiPageRedirects
dbr:Load_value_injection
Subject Item
dbr:LVI
dbo:wikiPageWikiLink
dbr:Load_value_injection
dbo:wikiPageDisambiguates
dbr:Load_value_injection
Subject Item
dbr:Load_Value_Injection
dbo:wikiPageWikiLink
dbr:Load_value_injection
dbo:wikiPageRedirects
dbr:Load_value_injection
Subject Item
wikipedia-en:Load_value_injection
foaf:primaryTopic
dbr:Load_value_injection