Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2018-10-15 23:23:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
[$] Fighting Spectre with cache flushes
One of the more difficult aspects of the Spectre hardware vulnerability is
finding all of the locations in the code that might be exploitable. There
are many locations that look vulnerable that aren't, and others that are
exploitable without being obvious. It has long been clear that finding all
of the exploitable spots is a long-term task, and keeping new ones from
being introduced will not be easy. But there may be a simple technique that
can block a large subset of the possible exploits with a minimal cost.


(Читать комментарии) (Добавить комментарий)