Allow me to summarize x86 side channel attacks: Spectre v1: speculation is insecure by design Spectre v2: secure branch prediction matters Meltdown: Intel are dumbasses L1TF: Intel are monumental, inexcusable dumbasses PortSmash: hyperthreading is insecure by design
-
-
(I know ECC as it exists today for DRAM does not completely mitigate rowhammer, but it certainly helps a lot)
-
Rowhammer has been solved, BTW. There are algorithms that can be used to proactively refresh vulnerable rows. Combined with faster refresh intervals, it's an effective mitigation.
- Show replies
New conversation -
-
-
ECC would increase DRAM costs by at least 11%. Notice how it isn’t used in phones and many embedded devices? 200M PCs, $30/PC —> you want to spend $600M in BOM and $1.2B in consumer prices *annually* to “help” and not solve a problem? That sounds like poor economics.
-
Mitigating via smarter controllers is a much better approach, but it only helps and doesn’t solve :( Physics is an unforgiving enemy...
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.