이 문서를 언급한 문서들5
- WorkerDOM... use SharedArrayBuffer, most likely to Spectre.
- SharedArrayBufferThe Spectre vulnerability seized ShardArrayBuffer in 2018, ...
- Project PIRI Initial Proposal... a temporary setback following the Spectre vulnerability, leading to the disabling ...
- Meltdown and Spectre- Spectre makes the CPU jump to ...
- Meltdown... CPU vulnerabilities (the other being Spectre). Meltdown affects Intel x86 microprocessors, ...
Spectre
Spectre refers to one of the two original transient execution CPU vulnerabilities (Meltdown), which involve microarchitectural timing side-channel attacks. These affect modern microprocessors that perform branch prediction and other forms of speculation. On most processors, the speculative execution resulting from a branch misprediction may leave observable side effects that reveal private data to attackers. For example, suppose the pattern of memory accesses performed by such speculative execution depends on private data. In that case, the resulting state of the data cache constitutes a side channel through which an attacker can extract information about the personal data using a timing attack. Spectre (security vulnerability)