- Google's solution to the Spectre and Meltdown exploits - supposedly results in no performance degradation https://support.google.com/faqs/answer/7625886 4 comments programming
- Retpoline: a software construct for preventing branch-target-injection https://support.google.com/faqs/answer/7625886 14 comments cpp
Linking pages
- New working speculative execution attack sends Intel and AMD scrambling | Ars Technica https://arstechnica.com/information-technology/2022/07/intel-and-amd-cpus-vulnerable-to-a-new-speculative-execution-attack/ 451 comments
- A year with Spectre: a V8 perspective · V8 https://v8.dev/blog/spectre 253 comments
- Meltdown and Spectre Linux kernel status - Linux Kernel Monkey Log http://kroah.com/log/blog/2018/01/06/meltdown-status/ 225 comments
- Meltdown & Spectre: Details und Benchmarks zu den Sicherheitslücken in CPUs - ComputerBase https://www.computerbase.de/2018-01/intel-cpu-pti-sicherheitsluecke/#update2 79 comments
- Signal >> Blog >> Technology Preview for secure value recovery https://signal.org/blog/secure-value-recovery/ 78 comments
- Firmware Updates and Initial Performance Data for Data Center Systems https://newsroom.intel.com/news/firmware-updates-and-initial-performance-data-for-data-center-systems/ 71 comments
- Latest Intel Security News: Updated Firmware Available for 6th, 7th and 8th Generation Intel Core Processors, Intel Xeon Scalable Processors and More https://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/ 49 comments
- Inception: how a simple XOR can cause a Microarchitectural Stack Overflow - Computer Security Group https://comsec.ethz.ch/research/microarch/inception/ 41 comments
- Retbleed: Arbitrary Speculative Code Execution with Return Instructions - Computer Security Group https://comsec.ethz.ch/research/microarch/retbleed/ 15 comments
- GitHub - gate-computer/wag: WebAssembly compiler implemented in Go https://github.com/tsavola/wag 10 comments
- Protecting our Google Cloud customers from new vulnerabilities without impacting performance https://www.blog.google/topics/google-cloud/protecting-our-google-cloud-customers-new-vulnerabilities-without-impacting-performance/?_lrsc=518f93f1-8618-43aa-86a7-4b6458b02aa1&%3Butm_campaign=2017-17q3-gc-cc-abm-googlecloud-unpaidsocial-twitter-leadgen-elevate&%3Butm_content=elevate&%3Butm_medium=social&%3Butm_source=twitter 4 comments
- Answering your questions about “Meltdown” and “Spectre” https://www.blog.google/topics/google-cloud/answering-your-questions-about-meltdown-and-spectre/?source=indiekings.com 3 comments
- Intel Offers Security Issue Update | Intel Newsroom https://newsroom.intel.com/news/intel-offers-security-issue-update/?cid=em-elq-33487 3 comments
- Google says CPU patches cause ‘negligible impact on performance’ with new technique - The Verge https://www.theverge.com/2018/1/4/16851132/meltdown-spectre-google-cpu-patch-performance-slowdown 2 comments
- In debt to Retpoline – cyber.wtf https://cyber.wtf/2018/02/13/in-debt-to-retpoline/ 1 comment
- GitHub - hannob/meltdownspectre-patches: Summary of the patch status for Meltdown / Spectre https://github.com/hannob/meltdownspectre-patches 0 comments
- Answering your questions about “Meltdown” and “Spectre” https://www.blog.google/topics/google-cloud/answering-your-questions-about-meltdown-and-spectre/ 0 comments
- The Cost of BPF Tail Calls | π · chaingo https://pchaigno.github.io/ebpf/2021/03/22/cost-bpf-tail-calls.html 0 comments
- You Just Need to Speculate to Exfiltrate - DEV Community https://dev.to/__richardt/you-just-need-to-speculate-to-exfiltrate-2fho 0 comments
- speculation-bugs/README.md at master · marcan/speculation-bugs · GitHub https://github.com/marcan/speculation-bugs/blob/master/README.md 0 comments
Linked pages
- Project Zero: Reading privileged memory with a side-channel https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html 630 comments
- ⚙ D41723 Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715, "Branch Target Injection", and is one of the two halves to Spectre.. https://reviews.llvm.org/D41723 245 comments
- http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-optimization-manual.pdf 86 comments
- http://www.cs.ucr.edu/~nael/pubs/micro16.pdf 8 comments
Would you like to stay up to date with C & C++? Checkout C & C++
Weekly.
Related searches:
Search whole site: site:support.google.com
Search title: Retpoline: a software construct for preventing branch-target-injection - Google Help
See how to search.