Главная
Study mode:
on
1
Introduction
2
History of making computers fast
3
Speculation
4
Fault Attacks
5
Speculative Execution
6
Variant 1 Attack
7
Bug vs Symptom
8
Hardware vs Software
9
Speculation Barrier Instructions
10
Complexity
11
Questions
Description:
Explore the critical security vulnerabilities in modern processors through this IEEE Symposium talk on Spectre Attacks. Delve into how branch prediction and speculative execution, designed to maximize performance, can be exploited to leak confidential information. Examine practical attacks that combine side channel attacks, fault attacks, and return-oriented programming methodologies to read arbitrary memory from victim processes. Understand the widespread impact of these vulnerabilities across Intel, AMD, and ARM microprocessors used in billions of devices. Learn about the challenges in implementing effective countermeasures and the need for fundamental fixes in processor designs and instruction set architectures. Gain insights into the history of processor optimization, the mechanics of speculation and fault attacks, and the complexities involved in addressing these security issues.

Spectre Attacks Exploiting Speculative Execution

IEEE
Add to list
0:00 / 0:00