{"title":"熔毁脆弱性的评估","authors":"Mateusz Nosek, K. Szczypiorski","doi":"10.1145/3514105.3514112","DOIUrl":null,"url":null,"abstract":"These days processors are becoming faster and faster. This translates indirectly into a significant improvement in the quality of life. However, there is a price to be paid; this evolution is associated with the emergence of many threats, which seem to develop even faster and are often not realized by professionals. Striving to maximally increase the computational power resulted in vulnerabilities on the level of the very processors. These vulnerabilities are mostly associated with the mechanisms of speculative execution and cache use in modern processors. Some of them came to light after many years. An example here might be Spectre vulnerabilities class which has been found in most Intel's processors (and not only) from 2006 and which was disclosed as late as in 2017. In the recent years many of such security vulnerabilities arose and according to many experts this is just the beginning. This article presents our evaluation of Spectre version 3 (Meltdown) vulnerability. It is just a prelude to further research regarding low-level vulnerabilities we are going to pursue.","PeriodicalId":360718,"journal":{"name":"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Evaluation of Meltdown Vulnerability\",\"authors\":\"Mateusz Nosek, K. Szczypiorski\",\"doi\":\"10.1145/3514105.3514112\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"These days processors are becoming faster and faster. This translates indirectly into a significant improvement in the quality of life. However, there is a price to be paid; this evolution is associated with the emergence of many threats, which seem to develop even faster and are often not realized by professionals. Striving to maximally increase the computational power resulted in vulnerabilities on the level of the very processors. These vulnerabilities are mostly associated with the mechanisms of speculative execution and cache use in modern processors. Some of them came to light after many years. An example here might be Spectre vulnerabilities class which has been found in most Intel's processors (and not only) from 2006 and which was disclosed as late as in 2017. In the recent years many of such security vulnerabilities arose and according to many experts this is just the beginning. This article presents our evaluation of Spectre version 3 (Meltdown) vulnerability. It is just a prelude to further research regarding low-level vulnerabilities we are going to pursue.\",\"PeriodicalId\":360718,\"journal\":{\"name\":\"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3514105.3514112\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3514105.3514112","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
These days processors are becoming faster and faster. This translates indirectly into a significant improvement in the quality of life. However, there is a price to be paid; this evolution is associated with the emergence of many threats, which seem to develop even faster and are often not realized by professionals. Striving to maximally increase the computational power resulted in vulnerabilities on the level of the very processors. These vulnerabilities are mostly associated with the mechanisms of speculative execution and cache use in modern processors. Some of them came to light after many years. An example here might be Spectre vulnerabilities class which has been found in most Intel's processors (and not only) from 2006 and which was disclosed as late as in 2017. In the recent years many of such security vulnerabilities arose and according to many experts this is just the beginning. This article presents our evaluation of Spectre version 3 (Meltdown) vulnerability. It is just a prelude to further research regarding low-level vulnerabilities we are going to pursue.