Examples of using Speculative execution in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
Impact: Systems using Intel® Core-based microprocessors may potentially allow a local process to infer data utilizing Lazy FP state restore from another process through a speculative execution side channel.
Impact: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault
Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as“speculative execution side-channel attacks” that affect many modern processors and operating systems including Intel, AMD, and ARM.
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault
Impact: Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis Description:
Impact: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
So although there is much to admire in the people that can make all the speculative execution engines in a CPU spin,
These features are known as“out-of-order-execution” and“speculative execution.”.
These techniques are called"out-of-order" and"speculative" execution.
ARM that make use of speculative execution to improve their performance.
Last but not least, a speculative execution side-channel vulnerability,
when he blogged about the possibility of abusing speculative execution in order to read kernel memory in user mode.
ADV180002- Guidance to mitigate speculative execution side-channel vulnerabilities.
Windows Server guidance to protect against speculative execution side-channel vulnerabilities.
The technical name is“speculative execution side-channel vulnerabilities”.
If the prediction was wrong, this speculative execution is rolled back in a way that is intended to be invisible to software.".
If the prediction was wrong, this speculative execution is rolled back in a way that is meant to be invisible to software.
Intel published information about a new subclass of speculative execution side channel vulnerabilities known as Microarchitectural Data Sampling.".
Provides protections from an additional subclass of speculative execution side channel vulnerability known as Speculative Store Bypass(CVE-2018-3639).