Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization
Abstract
References
Index Terms
- Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization
Recommendations
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecuritySpectre-BTB, also known as Spectre Variant 2, is often considered the most dangerous Spectre variant. While there are widely-deployed software workarounds on x86, such as Retpoline, there are no automated software workarounds for protecting generic ...
Software Mitigation of RISC-V Spectre Attacks
Innovative Security Solutions for Information Technology and CommunicationsAbstractSpeculative attacks are still an active threat today that, even if initially focused on the x86 platform, reach across all modern hardware architectures. RISC-V is a newly proposed open instruction set architecture that has seen traction from both ...
SecurityCloak: Protection against cache timing and speculative memory access attacks
AbstractMicroarchitectural innovations such as deep cache hierarchies, out-of-order execution, branch prediction and speculative execution in modern processors have made possible to meet ever-increasing demands for performance. However, these innovations ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Chair:
- Jianying Zhou,
- Co-chair:
- Tony Q. S. Quek,
- Program Chairs:
- Debin Gao,
- Alvaro Cardenas
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 234Total Downloads
- Downloads (Last 12 months)234
- Downloads (Last 6 weeks)39
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in