The following is a blog post from ACM SIGARCH Computer Architecture Today that considers some potential flaws in emerging software mitigations of Spectre-V1 attacks. Earlier this year, Mark Hill, Chair of the Computing Community Consortium (CCC) wrote a CCC blog post on the effects of Meltdown/Spectre, which is referenced in this piece. Mark will also be part of a joint keynote at Hot Chips titled, “ Spectre/Meltdown and What It Means for Future Chip Design.” Speculating about speculation: on the (lack of) security guarantees of Spectre-V1 mitigations By Mark Silberstein, Oleksii Oleksenko, Christof Fetzer on Jul 2, 2018 Spectre and Meltdown opened the Pandora box of a new class of speculative execution attacks that defeat standard memory protection mechanisms. These attacks […]
Computing Community Consortium Blog
The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.
Posts Tagged ‘spectre’