Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Speculative execution 22 found (103 total)

alternate case: speculative execution

Latency oriented processor architecture (1,609 words) [view diff] no match in snippet view article find links to article

Latency oriented processor architecture is the microarchitecture of a microprocessor designed to serve a serial computing thread with a low latency. This
Process–architecture–optimization model (363 words) [view diff] exact match in snippet view article find links to article
microarchitectures Tick–tock model Template:Intel processor roadmap Speculative execution CPU vulnerabilities Cannon Lake: only 1 CPU released, microarchitecture
Michael D. Smith (computer scientist) (502 words) [view diff] case mismatch in snippet view article
from Stanford University in 1993. His doctoral thesis, Support for Speculative Execution in High-Performance Processors, was published as a technical report
IA-32 (895 words) [view diff] exact match in snippet view article find links to article
x86-64 IA-64 List of former IA-32 compatible processor manufacturers Speculative execution CPU vulnerabilities "ditto(1) Mac OS X Manual Page". BSD General
List of AMD CPU microarchitectures (1,142 words) [view diff] exact match in snippet view article find links to article
microarchitectures List of AMD processors Table of AMD processors Speculative execution CPU vulnerabilities Hesseldahl, Arik (2000-07-06). "Why Cool Chip
IBM A2 (1,069 words) [view diff] exact match in snippet view article find links to article
cache is multi-versioned and supports transactional memory and speculative execution. A Blue Gene/Q chip has two DDR3 memory controllers running at 1
Paul Carl Kocher (464 words) [view diff] exact match in snippet view article find links to article
co-discovered and named the spectre vulnerability, which leverages speculative execution and other microprocessor performance optimizations to extract confidential
Tick–tock model (2,248 words) [view diff] exact match in snippet view article find links to article
spiritual successor to Xeon Phi. List of Intel CPU microarchitectures Speculative execution CPU vulnerabilities "Intel tick–tock model". intel.com. Intel Corporation
System Management Mode (1,420 words) [view diff] exact match in snippet view article find links to article
Extensible Firmware Interface (UEFI) Basic Input/Output System (BIOS) Speculative execution CPU vulnerabilities Domas, Christopher (2015-07-20). "The Memory
Apache Hadoop (4,947 words) [view diff] exact match in snippet view article find links to article
when everything can end up waiting for the slowest task. With speculative execution enabled, however, a single task can be executed on multiple slave
JavaScript (7,900 words) [view diff] case mismatch in snippet view article find links to article
In 2018, the paper that announced the Spectre attacks against Speculative Execution in Intel and other processors included a JavaScript implementation
Lazy evaluation (3,549 words) [view diff] case mismatch in snippet view article find links to article
40. doi:10.1145/581690.581694. ISBN 978-1-58113-605-0. Lazy and Speculative Execution Butler Lampson Microsoft Research OPODIS, Bordeaux, France 12 December
EBPF (3,992 words) [view diff] exact match in snippet view article find links to article
bounds-enforcement (e.g., masking instructions) and the verification of speculative execution paths. Spectre v4 is mitigated exclusively through speculation barriers
Hertzbleed (507 words) [view diff] exact match in snippet view article find links to article
Transient execution CPU vulnerability – Computer vulnerability using speculative execution "Hertzbleed Attack". Hertzbleed Attack. Retrieved 14 June 2022.
Cache timing attack (303 words) [view diff] case mismatch in snippet view article find links to article
Joel (2018). "DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors". 2018 51st Annual IEEE/ACM International Symposium on
Return-oriented programming (3,850 words) [view diff] exact match in snippet view article find links to article
(June 2022). "PACMAN: attacking ARM pointer authentication with speculative execution". Proceedings of the 49th Annual International Symposium on Computer
2018 in science (22,313 words) [view diff] exact match in snippet view article find links to article
"Intel's SGX blown wide open by, you guessed it, a speculative execution attack – Speculative execution attacks truly are the gift that keeps on giving"
Ryzen (8,534 words) [view diff] exact match in snippet view article find links to article
"Meltdown" and "Spectre" side channel attacks against CPUs with speculative execution". www.suse.com. Larabel, Michael (December 2, 2020). "The Spectre
Pwnie Awards (3,429 words) [view diff] case mismatch in snippet view article find links to article
Michael; Yarom, Yuval (July 2020). "Spectre Attacks: Exploiting Speculative Execution" (PDF). Communications of the ACM. 63 (7): 93–101. doi:10.1145/3399742
Site isolation (2,386 words) [view diff] case mismatch in snippet view article find links to article
Yuval (2022). "Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution". 2022 IEEE Symposium on Security and Privacy (SP). pp. 699–715
Acorn Archimedes (30,332 words) [view diff] exact match in snippet view article find links to article
instructions until a floating-point instruction result was required. Speculative execution was also employed to improve performance. Observed BASIC program
CPUID (13,252 words) [view diff] case mismatch in snippet view article find links to article
document number 347407-001, June 2021. Archived on Oct 26, 2022 "Speculative Execution Side Channel Mitigations" (PDF). Revision 2.0. Intel. May 2018 [January