With Spectre and Meltdown out in the public, a rushed effort was made to patch these vulnerabilities by operating system vendors. However, with the mitigations against said vulnerabilities there will be some form of performance impact. This study aims to find out how much of an impact the software mitigations against Spectre and Meltdown have on database management systems during an online transaction processing workload. An experiment was carried out to evaluate two popular open-source database management systems and see how they were affected before and after the software mitigations against Spectre and Meltdown was applied. The study found that there is an average of 4-5% impact on the performance when the software mitigations is applied...
Meltdown and Spectre are two vulnerabilities discovered in 2017. These vulnerabilities allow unautho...
Då datorer i alla dess former har kommit att bära betydande mängder relevant information för diverse...
This thesis presents the results of a vulnerability assessment and exploit development targeting a l...
With Spectre and Meltdown out in the public, a rushed effort was made to patch these vulnerabilities...
Meltdown och Spectre är två säkerhetshål som har upptäckts i moderna processorer. För att säkra sig ...
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
Att hantera förändringar av mjukvara via pappersdokument är långt ifrån effektivt. CMDB, Config...
Denna studie har undersökt vilken av CouchDB och MongoDB som har lägst svarstider vid hantering av f...
Injection attack is the most critical website security risk, and SQL-injection attack is the most re...
Web application vulnerabilities of critical are commonly found in web applications. The arguably mos...
Den här rapporten beskriver det arbete som är utfört hos Techsam AB för att eliminera eller åtminsto...
Denna studie har benchmarkat NoSQL systemen MongoDB och CassandraDB via en webbapplikation. NoSQL sy...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
The Internet of things (IoT) as an emerging technology provides great opportunities to simplify ever...
Meltdown and Spectre are two vulnerabilities discovered in 2017. These vulnerabilities allow unautho...
Då datorer i alla dess former har kommit att bära betydande mängder relevant information för diverse...
This thesis presents the results of a vulnerability assessment and exploit development targeting a l...
With Spectre and Meltdown out in the public, a rushed effort was made to patch these vulnerabilities...
Meltdown och Spectre är två säkerhetshål som har upptäckts i moderna processorer. För att säkra sig ...
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
Att hantera förändringar av mjukvara via pappersdokument är långt ifrån effektivt. CMDB, Config...
Denna studie har undersökt vilken av CouchDB och MongoDB som har lägst svarstider vid hantering av f...
Injection attack is the most critical website security risk, and SQL-injection attack is the most re...
Web application vulnerabilities of critical are commonly found in web applications. The arguably mos...
Den här rapporten beskriver det arbete som är utfört hos Techsam AB för att eliminera eller åtminsto...
Denna studie har benchmarkat NoSQL systemen MongoDB och CassandraDB via en webbapplikation. NoSQL sy...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
The Internet of things (IoT) as an emerging technology provides great opportunities to simplify ever...
Meltdown and Spectre are two vulnerabilities discovered in 2017. These vulnerabilities allow unautho...
Då datorer i alla dess former har kommit att bära betydande mängder relevant information för diverse...
This thesis presents the results of a vulnerability assessment and exploit development targeting a l...