Title
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]
Abstract
In early 2018, the disclosure of Spectre <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sup> and Meltdown <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> exposed the security risks inherent in speculative and out-of-order execution, which were hitherto considered harmless and valuable performance optimizations. In a nutshell, these attacks demonstrated that transient execution, where the computer executes code speculatively before reverting execution, leaves side effects on the microarchitecture, allowing adversaries to retrieve data across software- and hardware-enforced security boundaries.
Year
DOI
Venue
2021
10.1109/MSEC.2020.3036146
IEEE Security & Privacy
Keywords
DocType
Volume
microarchitectural security games,system attacks,security risks,whack-a-meltdown,system defenses
Journal
19
Issue
ISSN
Citations 
1
1540-7993
1
PageRank 
References 
Authors
0.35
0
2
Name
Order
Citations
PageRank
Daniel Genkin157931.18
Yuval Yarom277535.54