Spectre Attacks: Exploiting Speculative Execution
GPTKB entity
Statements (23)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:academic_journal
|
| gptkbp:author |
gptkb:Paul_Kocher
gptkb:Michael_Schwarz gptkb:Daniel_Genkin gptkb:Daniel_Gruss gptkb:Mike_Hamburg gptkb:Moritz_Lipp gptkb:Stefan_Mangard gptkb:Thomas_Prescher gptkb:Werner_Haas gptkb:Yuval_Yarom |
| gptkbp:citation |
Meltdown: Reading Kernel Memory from User Space
|
| gptkbp:impact |
hardware security
|
| gptkbp:publicationYear |
2018
|
| gptkbp:publishedIn |
gptkb:IEEE_Symposium_on_Security_and_Privacy
|
| gptkbp:topic |
gptkb:Spectre_vulnerability
computer security speculative execution side-channel attacks |
| gptkbp:url |
https://spectreattack.com/spectre.pdf
|
| gptkbp:bfsParent |
gptkb:Spectre_vulnerability
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Spectre Attacks: Exploiting Speculative Execution
|