Spectre Attacks: Exploiting Speculative Execution
This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim's process.
Spectre Attacks: Exploiting Speculative Execution
Meltdown: Reading Kernel Memory from User Space
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved