Re: [pl-seminar] PL-Arch Discussion on Spectre & Meltdown


Date: Tue, 26 Feb 2019 05:18:06 +0000
From: Thomas Reps <reps@xxxxxxxxxxx>
Subject: Re: [pl-seminar] PL-Arch Discussion on Spectre & Meltdown

Hi Mark,

 

It would definitely be useful to have discussion(s) about this topic. Do you have a suggestion for how to go about it?

 

Tom

 

From: Pl-seminar <pl-seminar-bounces@xxxxxxxxxxx> On Behalf Of Mark D. Hill
Sent: Monday, February 25, 2019 6:33 AM
To: pl-seminar@xxxxxxxxxxx
Cc: Mikko Lipasti <mikko@xxxxxxxxxxxxx>; Matt Sinclair <msinclair@xxxxxxxx>; Michael Swift <swift@xxxxxxxxxxx>; Joshua San Miguel <jsanmiguel@xxxxxxxx>
Subject: [pl-seminar] Fwd: PL-Arch Discussion on Spectre & Meltdown

 

Dear MadPL:

Is there interest in having a discussion on Spectre and Meltdown that use intentional processor core mis-speculation to exfiltrate protected information on almost all computers including your laptop and phone? Here is a formal PL paper from Google we could discuss:

Spectre is here to stay An analysis of side-channels and speculative execution

https://arxiv.org/abs/1902.05178v1 

I know itâs formal, as it has Greek letters with Greek-letter subscripts. :-) Thanks to Mike Swift for finding it. 

Also here is a practical introduction to the problem and the gist of current mitigation strategies that I co-wrote for IEEE Micro, so it might assume more architecture than everyone knows. 

On the Spectre and Meltdown Processor Security Vulnerabilities

 

Mark D. Hill, http://www.cs.wisc.edu/~markhill
John P. Morgridge Prof. and Gene M. Amdahl Prof. of CS 
Computer Sciences Department, University of Wisconsin-Madison
Chair, Computing Community Consortium, http://cra.org/ccc/

 

 

[← Prev in Thread] Current Thread [Next in Thread→]