Speculative execution is one of the key techniques that modern processors use to boost performance. However, recent research shows that speculative execution can be used to steal sensitive data. We present a software-based solution to mitigate Spectre attacks by restricting the control flow of speculatively-executed instructions.
CITATION STYLE
Shen, Z., Zhou, J., Ojha, D., & Criswell, J. (2018). POSTER: Restricting Control Flow During Speculative Execution. In Proceedings of the ACM Conference on Computer and Communications Security (Vol. 2018-January, pp. 2297–2299). Association for Computing Machinery. https://doi.org/10.1145/3243734.3278522
Mendeley helps you to discover research relevant for your work.