COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
Spectre and MeltdownAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Matthew Ireland. When they were publicly disclosed Spectre and Meltdown were described as an “absolute disaster” and prompted statements and blog posts from numerous tech companies describing the effects on their customers. The reason: Spectre and Meltdown both broke the fundamental security assumption of isolation and were both independent of the Operating System on which they were being run. Not only were the vulnerabilities not the result of a bug in software, but they could be exploited by Javascript code running in a browser and affected around 80% of modern desktops, including all but two variants of Intel processors produced after 19951. This talk will describe the background and details of one variant of Spectre, it will then describe Meltdown and will finish with a look at the interesting implementation details required for a working attack. [1] https://meltdownattack.com/ This talk is part of the Churchill CompSci Talks series. This talk is included in these lists:Note that ex-directory lists are not shown. |
Other listsUniversity of Cambridge, New Zealand Studies Seminar Group Mind-matter Unification Project (TCM Group, Cavendish Laboratory) Trinity Hall History SocietyOther talksPlant protection in France and Germany from the 1930s to the 1950s: the case of the Colorado potato beetle Making the tiniest machines Inducements to technical innovation in the British Industrial Revolution: markets, materiality and the invention of the spinning jenny How Science Really Works, and Why It Matters Acoustics and vibration of everyday things Failing with Style: Why and How we Should Encourage Humans to Fail with Highly Capable Systems |