Hardware Speculation Vulnerabilities and Mitigations
dc.contributor.author | Swearingen, Nathan | |
dc.contributor.author | Hosler, Ryan | |
dc.contributor.author | Zou, Xukai | |
dc.contributor.department | Computer and Information Science, School of Science | en_US |
dc.date.accessioned | 2023-02-23T17:22:29Z | |
dc.date.available | 2023-02-23T17:22:29Z | |
dc.date.issued | 2021-10 | |
dc.description.abstract | This paper will discuss speculation vulnerabilities, which arise from hardware speculation, an optimization technique. Unlike many other types of vulnerabilities, these are very difficult to patch completely, and there are techniques developed to mitigate them. We will look at many of the variants of this type of vulnerability. We will look at the techniques mitigating those vulnerabilities and the effectiveness and scope of each. Finally, we will compare and evaluate different vulnerabilities and mitigation techniques and recommend how various mitigation techniques apply to different situations. | en_US |
dc.eprint.version | Author's manuscript | en_US |
dc.identifier.citation | Swearingen, N., Hosler, R., & Zou, X. (2021). Hardware Speculation Vulnerabilities and Mitigations. 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS), 609–614. https://doi.org/10.1109/MASS52906.2021.00087 | en_US |
dc.identifier.uri | https://hdl.handle.net/1805/31429 | |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isversionof | 10.1109/MASS52906.2021.00087 | en_US |
dc.relation.journal | 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems | en_US |
dc.rights | Publisher Policy | en_US |
dc.source | Author | en_US |
dc.subject | hardware speculation | en_US |
dc.subject | optimization | en_US |
dc.subject | security | en_US |
dc.title | Hardware Speculation Vulnerabilities and Mitigations | en_US |
dc.type | Conference proceedings | en_US |