Hardware Speculation Vulnerabilities and Mitigations
If you need an accessible version of this item, please email your request to digschol@iu.edu so that they may create one and provide it to you.
Date
2021-10
Language
English
Embargo Lift Date
Committee Members
Degree
Degree Year
Department
Grantor
Journal Title
Journal ISSN
Volume Title
Found At
IEEE
Abstract
This paper will discuss speculation vulnerabilities, which arise from hardware speculation, an optimization technique. Unlike many other types of vulnerabilities, these are very difficult to patch completely, and there are techniques developed to mitigate them. We will look at many of the variants of this type of vulnerability. We will look at the techniques mitigating those vulnerabilities and the effectiveness and scope of each. Finally, we will compare and evaluate different vulnerabilities and mitigation techniques and recommend how various mitigation techniques apply to different situations.
Description
Keywords
item.page.description.tableofcontents
item.page.relation.haspart
Cite As
Swearingen, N., Hosler, R., & Zou, X. (2021). Hardware Speculation Vulnerabilities and Mitigations. 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS), 609–614. https://doi.org/10.1109/MASS52906.2021.00087
ISSN
Publisher
Series/Report
Sponsorship
Major
Extent
Identifier
Relation
Journal
2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems
Source
Author
Alternative Title
Type
Conference proceedings
Number
Volume
Conference Dates
Conference Host
Conference Location
Conference Name
Conference Panel
Conference Secretariat Location
Permanent Link
Version
Author's manuscript