Hardware Speculation Vulnerabilities and Mitigations

Date
2021-10
Language
English
Embargo Lift Date
Committee Members
Degree
Degree Year
Department
Grantor
Journal Title
Journal ISSN
Volume Title
Found At
IEEE
Abstract

This paper will discuss speculation vulnerabilities, which arise from hardware speculation, an optimization technique. Unlike many other types of vulnerabilities, these are very difficult to patch completely, and there are techniques developed to mitigate them. We will look at many of the variants of this type of vulnerability. We will look at the techniques mitigating those vulnerabilities and the effectiveness and scope of each. Finally, we will compare and evaluate different vulnerabilities and mitigation techniques and recommend how various mitigation techniques apply to different situations.

Description
item.page.description.tableofcontents
item.page.relation.haspart
Cite As
Swearingen, N., Hosler, R., & Zou, X. (2021). Hardware Speculation Vulnerabilities and Mitigations. 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS), 609–614. https://doi.org/10.1109/MASS52906.2021.00087
ISSN
Publisher
Series/Report
Sponsorship
Major
Extent
Identifier
Relation
Journal
2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems
Rights
Publisher Policy
Source
Author
Alternative Title
Type
Conference proceedings
Number
Volume
Conference Dates
Conference Host
Conference Location
Conference Name
Conference Panel
Conference Secretariat Location
Version
Author's manuscript
Full Text Available at
This item is under embargo {{howLong}}