# Foreshadow
*Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution*
https://foreshadowattack.eu/
- Discovered: 2018
- Mitigated: 2018
- Paper: [abstract](https://www.usenix.org/conference/usenixsecurity18/presentation/bulck), [pdf](https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-van_bulck.pdf)
- Foreshadow-NG paper: [abstract](https://typeset.io/papers/foreshadow-ng-breaking-the-virtual-memory-abstraction-with-2sw8qkg1q3), [pdf](https://foreshadowattack.eu/foreshadow-NG.pdf)
- PoC: [sgx-step](https://github.com/jovanbulck/sgx-step/tree/master/app/foreshadow)
### Main website
**Affected CPUs**
Intel confirmed that Foreshadow affects all SGX-enabled Core processors (Skylake and Kaby Lake), while Atom family processors with SGX support remain unaffected. Intel confirmed that Foreshadow-NG affects the following processes:
- Intel Core™ i3/i5/i7/M processor (45nm and 32nm)
- 2nd/3rd/4th/5th/6th/7th/8th generation Intel Core processors
- Intel Core X-series Processor Family for Intel X99 and X299 platforms
- Intel Xeon processor 3400/3600/5500/5600/6500/7500 series
- Intel Xeon Processor E3 v1/v2/v3/v4/v5/v6 Family
- Intel® Xeon® Processor E5 v1/v2/v3/v4 Family
- Intel® Xeon® Processor E7 v1/v2/v3/v4 Family
- Intel® Xeon® Processor Scalable Family
- Intel® Xeon® Processor D (1500, 2100)
See [Intel's security advisory](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html) for additional details.