![]() ![]() For example, if the pattern of memory accesses performed by such speculative execution depends on private data, the resulting state of the data cache constitutes a side channel through which an attacker may be able to extract information about the private data using a timing attack. On most processors, the speculative execution resulting from a branch misprediction may leave observable side effects that may reveal private data to attackers. ![]() These affect modern microprocessors that perform branch prediction and other forms of speculation. ![]() Spectre refers to one of the two original transient execution CPU vulnerabilities (the other being Meltdown), which involve microarchitectural timing side-channel attacks. A logo created for the vulnerability, featuring a ghost with a branchĪll pre-2019 microprocessors that use branch prediction ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |