Microprocessors such as those found in PCs and smartphones are complex in their design and nature. In recent years, an increasing number of security vulnerabilities have been found within these microprocessors that can leak sensitive user data and information. This report will investigate microarchitecture vulnerabilities focusing on the Spectre and Meltdown exploits and will look at what they do, how they do it and, the real-world impact these vulnerabilities can cause. Additionally, there will be an introduction to the basic concepts of how several PC components operate to support this
Historically, performance has been the most important feature when optimizing computer hardware. Mod...
This paper will discuss speculation vulnerabilities, which arise from hardware speculation, an optim...
The discrepancy between the abstract model used to reason about the security of computer systems and...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Over the past decades, the major objectives of computer design have been to improve performance and ...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
The pursuit of secure computation has always featured a tension between performance and security. Se...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
Today\u27s microprocessors often rely on microcode updates to address issues such as security or fun...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Historically, performance has been the most important feature when optimizing computer hardware. Mod...
This paper will discuss speculation vulnerabilities, which arise from hardware speculation, an optim...
The discrepancy between the abstract model used to reason about the security of computer systems and...
How operating systems have responded CPU vulnerabilities like Spectre and Meltdown that attack the f...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
Over the past decades, the major objectives of computer design have been to improve performance and ...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
The pursuit of secure computation has always featured a tension between performance and security. Se...
The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile device...
Today\u27s microprocessors often rely on microcode updates to address issues such as security or fun...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal da...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Historically, performance has been the most important feature when optimizing computer hardware. Mod...
This paper will discuss speculation vulnerabilities, which arise from hardware speculation, an optim...
The discrepancy between the abstract model used to reason about the security of computer systems and...