Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/130980
Citations
Scopus Web of Science® Altmetric
?
?
Type: Journal article
Title: Whack-a-meltdown: microarchitectural security games
Author: Genkin, D.
Yarom, Y.
Citation: IEEE Security and Privacy Magazine, 2021; 19(1):95-98
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Issue Date: 2021
ISSN: 1540-7993
1558-4046
Statement of
Responsibility: 
Daniel Genkin, Yuval Yarom
Abstract: In early 2018, the disclosure of Spectre 1 and Meltdown 2 exposed the security risks inherent in speculative and out-of-order execution, which were hitherto considered harmless and valuable performance optimizations. In a nutshell, these attacks demonstrated that transient execution, where the computer executes code speculatively before reverting execution, leaves side effects on the microarchitecture, allowing adversaries to retrieve data across software- and hardware-enforced security boundaries.
Rights: © 2021 IEEE
DOI: 10.1109/MSEC.2020.3036146
Grant ID: http://purl.org/au-research/grants/arc/DE200101577
Published version: http://dx.doi.org/10.1109/msec.2020.3036146
Appears in Collections:Aurora harvest 4
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.