当前位置: X-MOL 学术IEEE Secur. Priv. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]
IEEE Security & Privacy ( IF 2.9 ) Pub Date : 2021-01-26 , DOI: 10.1109/msec.2020.3036146
Daniel Genkin 1 , Yuval Yarom 2
Affiliation  

In early 2018, the disclosure of Spectre1 and Meltdown2 exposed the security risks inherent in speculative and out-of-order execution, which were hitherto considered harmless and valuable performance optimizations. In a nutshell, these attacks demonstrated that transient execution, where the computer executes code speculatively before reverting execution, leaves side effects on the microarchitecture, allowing adversaries to retrieve data across software- and hardware-enforced security boundaries.

中文翻译:

Whack-a-Meltdown:微体系结构安全游戏[系统攻击和防御]

在2018年初,Spectre 1和Meltdown 2的披露暴露了投机和无序执行固有的安全风险,这些风险迄今被认为是无害且有价值的性能优化。简而言之,这些攻击表明瞬态执行(即计算机在恢复执行之前以推测方式执行代码)对微体系结构产生了副作用,从而使对手可以跨软件和硬件实施的安全边界检索数据。
更新日期:2021-01-29
down
wechat
bug