The Spectre and Meltdown attacks are as unanticipated as the incompleteness theorem and failure of naive set theory. Though the issue is easy to see now, simply none of the world’s smartest chip designers had anticipated that system integrity could fail in this way.
-
-
One note--the first designs still lacked precise exceptions. It wasn't until HPS & Result Buffer (simultaneous with the development of the Reorder Buffer) that OoO developed in the modern sense; cf. "HPS Papers: A Retrospective". http://www.zytek.com/~melvin/HPSPapersARetrospective_IEEEMicro_201608.pdf …, it's pretty fascinating!
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
These attacks are the result of trying to retrofit secure virtualization features on top of complex speculative CPUs. Doing so, and deploying in the multi-tenant cloud, created economic incentive to find exploitable side channels... such as, it turns out, speculation.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.