Syntax Level Threats
Hypervisor Revenge
Spaceship Debris
I’m having a Meltdown
Semiconductor Spookies
100

This modern successor to C enforces ownership and borrowing rules at compile time, preventing use-after-free and data-race bugs.

What is Rust?

100

This modern Linux-based hypervisor is integrated into the kernel and forms the basis of most enterprise virtualization stacks.

What is KVM (Kernel-based Virtual Machine)?

100

This error-correction technology protects spacecraft memory from radiation by performing Single Error Correction / Double Error Detection, with Cassini-Huygens logging about 280 single-bit flips per day.

What is EDAC (Error Detection and Correction)?

100

The 1988 Internet worm that led to the creation of CERT/CC and infected roughly 10% of the Internet at the time.

What is the Morris Worm?


Network / OS

100

These circuit components store or dissipate energy but provide no power gain; early integrated circuits were revolutionary for combining them with transistors on a single die.

What are passive elements (resistors and capacitors)?

200

This high-assurance language, often paired with SPARK, is used in avionics and aerospace because it supports formal verification of safety-critical code.

What is Ada?

200

This Microsoft virtualization platform supports nested virtualization and integration with Windows Server environments.

What is Hyper-V?

200

Cryptographic implementations that remain stable during background memory correction cycles are called this, ensuring scrubbing doesn’t trigger false attestation failures.

What is scrub-aware cryptography?

200

This 2015 QEMU vulnerability, named for “Virtualized Environment Neglected Operations Manipulation,” let VMs execute code on the host.

What is VENOM (CVE-2015-3456)?


Virtualization

200

This 1974 scaling rule stated that voltage and current could shrink proportionally with transistor size, keeping power density constant until leakage ended the trend.

What is Dennard scaling?

300

This language’s runtime model isolates goroutines and channels to prevent shared-state concurrency vulnerabilities.

What is Go?

300

By virtualizing hardware at the processor level, hypervisors implement this isolation principle that prevents guest VMs from directly accessing host memory.

What is memory and I/O isolation?

300

Operating at 2–4 GHz, this radio band is the workhorse of spacecraft telemetry because it penetrates atmosphere reliably and resists rain fade.

What is the S-band?

300

Exploiting speculative CPU behavior, this 2018 vulnerability leaks privileged data via cache timing side-channels.

What is Spectre?


CPU / Microarchitecture

300

ARM follows this instruction-set philosophy that emphasizes simpler, uniform instructions for efficiency, while Intel’s x86 historically used its complex opposite. (2 answers for this)

What is RISC vs. CISC architecture?

400

This Kubernetes configuration language declaratively defines system states but requires policy enforcement tools like OPA or Kyverno for secure validation.

What are YAML files (in Kubernetes manifests)?

400

This open-source technology provides lightweight virtualization without a hypervisor, instead relying on namespaces and cgroups. It does not provide security isolation without hardware pairing. 

What are containers (e.g., Docker, Podman, LXC)?

400

Offering up to 500 Mbps throughput but suffering rain fade, this 26.5–40 GHz band underpins broadband constellations such as Starlink.

What is the Ka-band?

400

By rapidly activating DRAM rows, this 2014 hardware attack flips adjacent memory bits, compromising integrity.

What is Rowhammer?

(flip feng-shui also valid)


Hardware / DRAM

400

Running transistors just above threshold voltage to achieve order-of-magnitude energy savings defines this ultra-efficient computing regime.

What is near-threshold voltage (NTV) computing?

500

This toolset verifies program correctness using theorem proving, as seen in CompCert, a formally verified C compiler.

What are formal methods?

500

In cloud security, the struggle between transparency for users and confidentiality for providers reflects this broader political problem of cloud governance.

What is the trust asymmetry of virtualization?

500

Founded in 1982, this international body develops space-data standards like packet telemetry and compression; rival frameworks such as China’s GB/T and Russia’s GOST mirror geopolitical divisions.

What is the CCSDS (Consultative Committee for Space Data Systems)?

500

Manipulating satellite timing and position data to mislead navigation receivers describes this form of orbital cyberattack.

What is GPS / GNSS Spoofing?


Satellite / Network

500

To improve yield and mix process technologies, modern systems assemble smaller dies with interconnect standards like UCIe, a practice known as this.

What is chiplet-based heterogeneous integration?