Examples of using Speculative execution in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
Ideas like speculative execution.
Speculative execution improves processor speed by operating on multiple instructions at once- possibly in a different order than when they entered the CPU.
It's called“speculative execution.”.
Speculative execution is a further enhancement in which the code along the predicted path is not just prefetched but also executed before it is known whether the branch should be taken or not.
This is called"speculative execution.".
Speculative execution and out-of-order completion(called"dynamic execution" by Intel), which required new retire units in the execution core.
It's referred to as“speculative execution.”.
The threat relates to speculative execution and indirect branch prediction techniques which are used in some microprocessors manufactured by Intel.
This process is called“speculative execution”.
By exploiting normal speculative execution operations that work within these microarchitectural structures, an MDS attack can infer data that is being processed in the CPU by other apps, to which an attacker shouldn't normally have access to.
This process is known as“Speculative Execution“.
With the x86 naming scheme now legally cleared, IBM partnered with Cyrix to produce the 5x86 and then the very efficient 6x86(M1) and 6x86MX(MII) lines of Cyrix designs, which were the first x86microprocessors implementing register renaming to enable speculative execution.
This is“speculative execution.”.
Lazy restored states are potentially vulnerable to exploits where one process mayinfer register values of other processes through a speculative execution side channel that infers their value.”.
The technical name is“speculative execution side-channel vulnerabilities”.
The 6x86 is superscalar and superpipelined andperforms register renaming, speculative execution, out-of-order execution, and data dependency removal.
Impact: Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis.
Two variants of the vulnerabilities that use different techniques to exploit the speculative execution functions within the affected CPUs were identified and named.
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
Techniques such as branch prediction and speculative execution are used to lessen these branch penalties.
The Meltdown and Spectre exploitation techniques abuse speculative execution to access privileged memory, including that of the kernel, from a less-privileged user process such as a malicious app running on a device.
The IRB's purpose is the implement register renaming,out of order execution, speculative execution and to provide a temporary place for results to be stored until the instructions are retired.
Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Centaur's newest design, the VIA Nano,is their first processor with superscalar and speculative execution. It was, perhaps interestingly, introduced at about the same time as Intel's first"in-order" processor since the P5 Pentium, the Intel Atom.
Spectre variant 2 vulnerability(CVE-2017-5715)affects systems wherein microprocessors utilize speculative execution and indirect branch prediction, allowing a malicious program to read sensitive information, such as passwords, encryption keys, or sensitive information, including that of the kernel, using a side-channel analysis attack.
The POWER4 implements a superscalar microarchitecture through high-frequency speculative out-of-order execution using eight independent execution units.