Lines Matching full:speculative

7 and speculative execution on modern CPUs to read memory, possibly
8 bypassing access controls. Speculative execution side channel exploits
16 Speculative execution side channel methods affect a wide range of modern
18 use branch prediction and speculative execution.
53 CPUs use speculative operations to improve performance. That may leave
56 influence the speculative execution paths, and then use the side effects
57 of the speculative execution in the CPUs' caches and buffers to infer
58 privileged data touched during the speculative execution.
60 Spectre variant 1 attacks take advantage of speculative execution of
61 conditional branches, while Spectre variant 2 attacks use speculative
70 of speculative execution that bypasses conditional branch instructions
74 done speculatively before validation checks resolve. Such speculative
92 The branch target injection attack takes advantage of speculative
97 the victim. The side effects left in the CPU's caches during speculative
102 In Spectre variant 2 attacks, the attacker can steer speculative indirect
119 return stack buffer (RSB) :ref:`[13] <spec_ref13>` to cause speculative
131 speculative execution's side effects left in level 1 cache to infer the
164 for speculative execution. This could cause privileged memory to be
169 macros are used to prevent speculative loading of data.
191 swapgs, and then do a speculative percpu load using the user GS
199 rest of the speculative window.
207 target buffer on indirect jump and jump to gadget code in speculative
211 speculative execution, he would also need to pass a parameter to the
218 indirect branches. Return trampolines trap speculative execution paths
219 to prevent jumping to gadget code during speculative execution.
283 are used to stop speculative memory access.
287 the kernel to jump to gadget code in the speculative execution paths.
467 addresses. Speculative execution paths under retpolines are trapped
468 in an infinite loop to prevent any speculative execution jumping to
687 …analysis of speculative execution side channels <https://newsroom.intel.com/wp-content/uploads/sit…
715 … side-channels <https://developer.arm.com/support/arm-security-updates/speculative-processor-vulne…
719 … issues update <https://developer.arm.com/support/arm-security-updates/speculative-processor-vulne…
731 …] `MIPS: response on speculative execution and side channel vulnerabilities <https://www.mips.com/…
737 [11] `Spectre Attacks: Exploiting Speculative Execution <https://spectreattack.com/spectre.pdf>`_.