Hi Mark,
It would definitely be useful to have discussion(s) about this topic. Do you have a suggestion for how to go about it?
Tom
From: Pl-seminar <pl-seminar-bounces@xxxxxxxxxxx>
On Behalf Of Mark D. Hill
Sent: Monday, February 25, 2019 6:33 AM
To: pl-seminar@xxxxxxxxxxx
Cc: Mikko Lipasti <mikko@xxxxxxxxxxxxx>; Matt Sinclair <msinclair@xxxxxxxx>; Michael Swift <swift@xxxxxxxxxxx>; Joshua San Miguel <jsanmiguel@xxxxxxxx>
Subject: [pl-seminar] Fwd: PL-Arch Discussion on Spectre & Meltdown
Dear MadPL:
Is there interest in having a discussion on Spectre and Meltdown that use intentional processor core mis-speculation to exfiltrate protected information on almost all computers including your laptop and phone? Here is a formal PL paper from Google we could
discuss:
Spectre is here to stay An analysis of side-channels and speculative execution
https://arxiv.org/abs/1902.05178v1
I know itâs formal, as it has Greek letters with Greek-letter subscripts. :-) Thanks to Mike Swift for finding it.
Also here is a practical introduction to the problem and the gist of current mitigation strategies that I co-wrote for IEEE Micro, so it might assume more architecture than everyone knows.
On the Spectre and Meltdown Processor Security Vulnerabilities