Four variant mechanisms that can utilize a processor’s speculation to extract information.
This whitepaper looks at the susceptibility of Arm implementations following research findings from security researchers, including Google and MIT, on new potential cache timing side-channels exploiting processor speculation. This paper also outlines possible mitigations that can be employed for software designed to run on existing Arm processors.
To read more, click here.
Leave a Reply