SpectreRewind Article Swipe
Related Concepts
Computer science
Covert
Transient (computer programming)
Cache
Covert channel
State (computer science)
Microarchitecture
Operating system
Embedded system
Computer security
Programming language
Cloud computing
Philosophy
Cloud computing security
Security information and event management
Linguistics
Jacob Fustos
,
Michael M. Bechtel
,
Heechul Yun
·
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.1145/3411504.3421216
· OA: W3097783227
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.1145/3411504.3421216
· OA: W3097783227
Transient execution attacks use microarchitectural covert channels to leak secrets that should not have been accessible during logical program execution. Commonly used micro-architectural covert channels are those that leave lasting footprints in the micro-architectural state, for example, a cache state change, from which the secret is recovered after the transient execution is completed.
Related Topics
Finding more related topics…