# Foreshadow *Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution* https://foreshadowattack.eu/ - Discovered: 2018 - Mitigated: 2018 - Paper: [abstract](https://www.usenix.org/conference/usenixsecurity18/presentation/bulck), [pdf](https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-van_bulck.pdf) - Foreshadow-NG paper: [abstract](https://typeset.io/papers/foreshadow-ng-breaking-the-virtual-memory-abstraction-with-2sw8qkg1q3), [pdf](https://foreshadowattack.eu/foreshadow-NG.pdf) - PoC: [sgx-step](https://github.com/jovanbulck/sgx-step/tree/master/app/foreshadow) ### Main website **Affected CPUs** Intel confirmed that Foreshadow affects all SGX-enabled Core processors (Skylake and Kaby Lake), while Atom family processors with SGX support remain unaffected. Intel confirmed that Foreshadow-NG affects the following processes: - Intel Core™ i3/i5/i7/M processor (45nm and 32nm) - 2nd/3rd/4th/5th/6th/7th/8th generation Intel Core processors - Intel Core X-series Processor Family for Intel X99 and X299 platforms - Intel Xeon processor 3400/3600/5500/5600/6500/7500 series - Intel Xeon Processor E3 v1/v2/v3/v4/v5/v6 Family - Intel® Xeon® Processor E5 v1/v2/v3/v4 Family - Intel® Xeon® Processor E7 v1/v2/v3/v4 Family - Intel® Xeon® Processor Scalable Family - Intel® Xeon® Processor D (1500, 2100) See [Intel's security advisory](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html) for additional details.