| Display title | TLBleed | 
| Default sort key | TLBleed | 
| Page length (in bytes) | 3,118 | 
| Namespace ID | 0 | 
| Page ID | 242175 | 
| Page content language | en - English | 
| Page content model | wikitext | 
| Indexing by robots | Allowed | 
| Number of redirects to this page | 0 | 
| Counted as a content page | Yes | 
| HandWiki item ID | None | 
| Edit | Allow all users (infinite) | 
| Move | Allow all users (infinite) | 
| Page creator | imported>Len Stevenson | 
| Date of page creation | 09:32, 10 May 2022 | 
| Latest editor | imported>Len Stevenson | 
| Date of latest edit | 09:32, 10 May 2022 | 
| Total number of edits | 1 | 
| Recent number of edits (within past 90 days) | 0 | 
| Recent number of distinct authors | 0 | 
Description | Content | 
Article description: (description) This attribute controls the content of the description and og:description elements. | TLBleed is a cryptographic side-channel attack that uses machine learning to exploit a timing side-channel via the translation look-aside buffer (TLB) on modern microprocessors that use simultaneous multithreading. (As of June 2018), the attack has only been demonstrated experimentally on Intel processors... |