Please use this identifier to cite or link to this item:
Scopus Web of Science® Altmetric
Type: Journal article
Title: Whack-a-meltdown: microarchitectural security games
Author: Genkin, D.
Yarom, Y.
Citation: IEEE Security and Privacy Magazine, 2021; 19(1):95-98
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Issue Date: 2021
ISSN: 1540-7993
Statement of
Daniel Genkin, Yuval Yarom
Abstract: In early 2018, the disclosure of Spectre 1 and Meltdown 2 exposed the security risks inherent in speculative and out-of-order execution, which were hitherto considered harmless and valuable performance optimizations. In a nutshell, these attacks demonstrated that transient execution, where the computer executes code speculatively before reverting execution, leaves side effects on the microarchitecture, allowing adversaries to retrieve data across software- and hardware-enforced security boundaries.
Rights: © 2021 IEEE
DOI: 10.1109/MSEC.2020.3036146
Grant ID:
Published version:
Appears in Collections:Aurora harvest 4
Computer Science publications

Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.