Spectre Attacks: Exploiting Speculative Execution
GPTKB entity
Statements (23)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:academic_journal
|
gptkbp:author |
gptkb:Paul_Kocher
gptkb:Michael_Schwarz gptkb:Daniel_Genkin gptkb:Daniel_Gruss gptkb:Mike_Hamburg gptkb:Moritz_Lipp gptkb:Stefan_Mangard gptkb:Thomas_Prescher gptkb:Werner_Haas gptkb:Yuval_Yarom |
gptkbp:citation |
Meltdown: Reading Kernel Memory from User Space
|
https://www.w3.org/2000/01/rdf-schema#label |
Spectre Attacks: Exploiting Speculative Execution
|
gptkbp:impact |
hardware security
|
gptkbp:publicationYear |
2018
|
gptkbp:publishedIn |
gptkb:IEEE_Symposium_on_Security_and_Privacy
|
gptkbp:topic |
gptkb:Spectre_vulnerability
computer security speculative execution side-channel attacks |
gptkbp:url |
https://spectreattack.com/spectre.pdf
|
gptkbp:bfsParent |
gptkb:Spectre_vulnerability
|
gptkbp:bfsLayer |
7
|