I wonder whether having the language know about array bounds (i.e. memory safety) makes it easier to deploy mitigations against Spectre…
-
Show this thread
-
In C bounds checks aren’t tightly coupled to the underlying guarded data. But in a safe PL, check+load is conceptually a single atomic op.
3 replies 1 retweet 5 likesShow this thread -
Replying to @pcwalton
How does your argument apply to the fact that chrome memory was readable with javascript?
1 reply 0 retweets 1 like
Replying to @dgryski
We don’t have a reasonable “load without speculation” CPU instruction yet, so JS VMs can’t use it. :)
6:10 PM - 3 Jan 2018
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.