GPN18:Meltdown and Spectre for normal people

aus dem Wiki des Entropia e.V., CCC Karlsruhe
Version vom 5. Mai 2018, 14:39 Uhr von Fahrplanbot (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „ Ein Vortrag von Jens auf der GPN17. Meltdown and Spectre are security flaws that gained widespread media coverage in the first days of 2018. Contrary to…“)
(Unterschied) ← Nächstältere Version | Aktuelle Version (Unterschied) | Nächstjüngere Version → (Unterschied)

Ein Vortrag von Jens auf der GPN17.

Meltdown and Spectre are security flaws that gained widespread media coverage in the first days of 2018. Contrary to other security bugs these flaws are

  • hardware, not software based
  • the direct consequence of years of performance improvements
  • extremely widespread because they affect (nearly all) computer systems, including mobile phones
  • difficult to patch

This talk fills the gap between _"Intel caused a terrible security bug. Everybody panic!"_ and _"By priming the BPU of the CPU a malicious process can read out of bounds memory via speculative code execution"_.

  • This talk comes with a side order on "Understanding CPU architecture" and "Managing security vulnerabilities".*

Links