Speculative

Results: 1134



#Item
1Computer hardware / Computing / Technology / Computer security / Side-channel attacks / X86 architecture / Intel / Meltdown / Spectre / Wind River Systems / Advanced Micro Devices / Internet of things

FROM THE EDITOR Spectre, the Deep Firmware Threat Born before silicon-level security was deemed necessary, speculative execution is now something

Add to Reading List

Source URL: www.eproductalert.com

Language: English - Date: 2018-04-18 19:10:00
2

Call for Papers (anticipated publication date earlyVolume 31 Latin American Speculative Fiction (www.paradoxa.com) Editors: Debra Ann Castillo () and Liliana Colanzi () Spe

Add to Reading List

Source URL: lasa.international.pitt.edu

Language: Spanish - Date: 2016-10-14 12:08:14
    3

    SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution arXiv:1802.09085v3 [cs.CR] 3 JunGuoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2018-06-04 20:57:01
      4

      Let’s Be a Little Less Indirect... David S. Miller NetconfBoston All Hail Spectre! We all now know that speculative executation can be exploited.

      Add to Reading List

      Source URL: vger.kernel.org

      Language: English - Date: 2018-05-31 04:16:02
        5

        Accademia in onore del Beato Giovanni Duns ScotoCome sempre, il mio sarà un discorso “di basso profilo”, discorso dell’editore preoccupato più che di teoria e di questioni speculative, di come megl

        Add to Reading List

        Source URL: www.scoto.net

        Language: Italian - Date: 2017-11-24 03:42:24
          6

          Speculative Tag Access for Reduced Energy Dissipation in Set-Associative L1 Data Caches Alen Bardizbanyan† , Magnus Själander‡ , David Whalley‡ , and Per Larsson-Edefors† † Chalmers University of Technology,

          Add to Reading List

          Source URL: www.sjalander.com

          Language: English - Date: 2014-03-26 17:56:01
            7

            Multiple Outcomes of Speculative Behavior in Theory and in the Laboratory1 James S. Costain Research Division, Bank of Spain Frank Heinemann Technische Univ., Berlin

            Add to Reading List

            Source URL: www.macroeconomics.tu-berlin.de

            Language: English - Date: 2013-05-17 04:31:57
              8

              THREE-DMENSIONAL DATA INTERACTION Henry Collingham BA THIS SPECULATIVE PROJECT WAS AN INVESTIGATION INTO THE WAY WE INTERACT WITH THREE-DIMENSIONAL DATA, IN PHYSICAL AND DIGITAL SPACE.

              Add to Reading List

              Source URL: www.industrialdesign.lth.se

              Language: English - Date: 2013-10-03 08:05:59
                9

                Speculative Attacks with Multiple Sources of Public Information Camille Cornand Frank Heinemann

                Add to Reading List

                Source URL: www.macroeconomics.tu-berlin.de

                Language: English - Date: 2008-11-06 16:23:17
                  10Computer hardware / Computer architecture / Computer security / X86 architecture / Side-channel attacks / Computing / Spectre / Meltdown / CPU cache / Out-of-order execution / Speculative Store Bypass

                  Spectre and Meltdown: Data leaks during speculative execution Speaker: Jann Horn (Google Project Zero) Paul Kocher (independent) Daniel Genkin (University of Pennsylvania and

                  Add to Reading List

                  Source URL: rwc.iacr.org

                  Language: English - Date: 2018-01-18 01:49:18
                  UPDATE