We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Meltdown and Spectre...

Formal Metadata

Title
Meltdown and Spectre...
Subtitle
... for normal people
Title of Series
Number of Parts
94
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Meltdown and Spectre are security flaws that gained widespread media coverage in the first days of 2018. Contrary to other security bugs these flaws are hardware, not software based&lt(/li&gt the direct consequence of years of performance improvements extremely widespread because they affect (nearly all) computer systems, including mobile phones difficult to patch This talk fills the gap between "Intel caused a terrible security bug. Everybody panic!" and "By priming the BPU of the CPU a malicious process can read out of bounds memory via speculative code execution". This talk comes with a side order on "Understanding CPU architecture" and "Managing security vulnerabilities". Jens Neuhalfen https://programm.froscon.de/2018/events/2101.html