paint-brush
Exploiting Spectre with Deep learningby@syne
1,009 reads
1,009 reads

Exploiting Spectre with Deep learning

by Jason Snell5mJanuary 9th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

<a href="https://googleprojectzero.blogspot.com/" target="_blank">Google’s Project Zero</a> dropped a <a href="https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" target="_blank">bombshell</a> on the security community last week detailing CPU bugs affecting <a href="https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf" target="_blank">Intel</a>, <a href="https://www.amd.com/en/corporate/speculative-execution" target="_blank">AMD</a>, and <a href="https://developer.arm.com/support/security-update" target="_blank">ARM</a> architectures going back as far as Pentium Pros. Yup, the chip with a mountain of cache and immortalized by Weird Al.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Exploiting Spectre with Deep learning
Jason Snell HackerNoon profile picture
Jason Snell

Jason Snell

@syne

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite