Abstract
Speculative execution is one of the key techniques that modern processors use to boost performance. However, recent research shows that speculative execution can be used to steal sensitive data. We present a software-based solution to mitigate Spectre attacks by restricting the control flow of speculatively-executed instructions.
Author supplied keywords
Cite
CITATION STYLE
Shen, Z., Zhou, J., Ojha, D., & Criswell, J. (2018). POSTER: Restricting Control Flow During Speculative Execution. In Proceedings of the ACM Conference on Computer and Communications Security (Vol. 2018-January, pp. 2297–2299). Association for Computing Machinery. https://doi.org/10.1145/3243734.3278522
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.