language:
Find link is a tool written by Edward Betts.searching for Speculative execution 22 found (103 total)
alternate case: speculative execution
Latency oriented processor architecture
(1,609 words)
[view diff]
no match in snippet
view article
find links to article
Latency oriented processor architecture is the microarchitecture of a microprocessor designed to serve a serial computing thread with a low latency. ThisProcess–architecture–optimization model (363 words) [view diff] exact match in snippet view article find links to article
microarchitectures Tick–tock model Template:Intel processor roadmap Speculative execution CPU vulnerabilities Cannon Lake: only 1 CPU released, microarchitectureMichael D. Smith (computer scientist) (502 words) [view diff] case mismatch in snippet view article
from Stanford University in 1993. His doctoral thesis, Support for Speculative Execution in High-Performance Processors, was published as a technical reportIA-32 (895 words) [view diff] exact match in snippet view article find links to article
x86-64 IA-64 List of former IA-32 compatible processor manufacturers Speculative execution CPU vulnerabilities "ditto(1) Mac OS X Manual Page". BSD GeneralList of AMD CPU microarchitectures (1,142 words) [view diff] exact match in snippet view article find links to article
microarchitectures List of AMD processors Table of AMD processors Speculative execution CPU vulnerabilities Hesseldahl, Arik (2000-07-06). "Why Cool ChipIBM A2 (1,069 words) [view diff] exact match in snippet view article find links to article
cache is multi-versioned and supports transactional memory and speculative execution. A Blue Gene/Q chip has two DDR3 memory controllers running at 1Paul Carl Kocher (464 words) [view diff] exact match in snippet view article find links to article
co-discovered and named the spectre vulnerability, which leverages speculative execution and other microprocessor performance optimizations to extract confidentialTick–tock model (2,248 words) [view diff] exact match in snippet view article find links to article
spiritual successor to Xeon Phi. List of Intel CPU microarchitectures Speculative execution CPU vulnerabilities "Intel tick–tock model". intel.com. Intel CorporationSystem Management Mode (1,420 words) [view diff] exact match in snippet view article find links to article
Extensible Firmware Interface (UEFI) Basic Input/Output System (BIOS) Speculative execution CPU vulnerabilities Domas, Christopher (2015-07-20). "The MemoryApache Hadoop (4,947 words) [view diff] exact match in snippet view article find links to article
when everything can end up waiting for the slowest task. With speculative execution enabled, however, a single task can be executed on multiple slaveJavaScript (7,900 words) [view diff] case mismatch in snippet view article find links to article
In 2018, the paper that announced the Spectre attacks against Speculative Execution in Intel and other processors included a JavaScript implementationLazy evaluation (3,549 words) [view diff] case mismatch in snippet view article find links to article
40. doi:10.1145/581690.581694. ISBN 978-1-58113-605-0. Lazy and Speculative Execution Butler Lampson Microsoft Research OPODIS, Bordeaux, France 12 DecemberEBPF (3,992 words) [view diff] exact match in snippet view article find links to article
bounds-enforcement (e.g., masking instructions) and the verification of speculative execution paths. Spectre v4 is mitigated exclusively through speculation barriersHertzbleed (507 words) [view diff] exact match in snippet view article find links to article
Transient execution CPU vulnerability – Computer vulnerability using speculative execution "Hertzbleed Attack". Hertzbleed Attack. Retrieved 14 June 2022.Cache timing attack (303 words) [view diff] case mismatch in snippet view article find links to article
Joel (2018). "DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors". 2018 51st Annual IEEE/ACM International Symposium onReturn-oriented programming (3,850 words) [view diff] exact match in snippet view article find links to article
(June 2022). "PACMAN: attacking ARM pointer authentication with speculative execution". Proceedings of the 49th Annual International Symposium on Computer2018 in science (22,313 words) [view diff] exact match in snippet view article find links to article
"Intel's SGX blown wide open by, you guessed it, a speculative execution attack – Speculative execution attacks truly are the gift that keeps on giving"Ryzen (8,534 words) [view diff] exact match in snippet view article find links to article
"Meltdown" and "Spectre" side channel attacks against CPUs with speculative execution". www.suse.com. Larabel, Michael (December 2, 2020). "The SpectrePwnie Awards (3,429 words) [view diff] case mismatch in snippet view article find links to article
Michael; Yarom, Yuval (July 2020). "Spectre Attacks: Exploiting Speculative Execution" (PDF). Communications of the ACM. 63 (7): 93–101. doi:10.1145/3399742Site isolation (2,386 words) [view diff] case mismatch in snippet view article find links to article
Yuval (2022). "Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution". 2022 IEEE Symposium on Security and Privacy (SP). pp. 699–715Acorn Archimedes (30,332 words) [view diff] exact match in snippet view article find links to article
instructions until a floating-point instruction result was required. Speculative execution was also employed to improve performance. Observed BASIC programCPUID (13,252 words) [view diff] case mismatch in snippet view article find links to article
document number 347407-001, June 2021. Archived on Oct 26, 2022 "Speculative Execution Side Channel Mitigations" (PDF). Revision 2.0. Intel. May 2018 [January