Examples of using Speculative execution in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
The technical name is“speculative execution side-channel vulnerabilities”.
Meltdown" and"Spectre" issues take advantage of amodern CPU performance feature called"speculative execution".
ADV180002- Guidance to mitigate speculative execution side-channel vulnerabilities.
Background The Meltdown and Spectre issues take advantage of amodern CPU performance feature called speculative execution.
Windows Server guidance to protect against speculative execution side-channel vulnerabilities.
The threat relates to speculative execution and indirect branch prediction techniques which are used in some microprocessors manufactured by Intel.
Modern processors are designed to perform something called“speculative execution” to enhance performance.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Alternative protection for Windows Server 2016 Hyper-V Hosts against the speculative execution side-channel vulnerabilities.
If the prediction was wrong, this speculative execution is rolled back in a way that is meant to be invisible to software.
Please check out the Alternative protections forWindows Server 2016 Hyper-V Hosts against the speculative execution side-channel vulnerabilities.
By abusing a CPU design concept called speculative execution, malicious software can access privileged on the affected machine.
This ensures that implementation specific system registers cannot be leaked via a speculative execution side-channel.
Provides protections from an additional subclass of speculative execution side channel vulnerability known as Speculative Store Bypass(CVE-2018-3639).
Please check out the Alternative protections forWindows Server 2016 Hyper-V Hosts against the speculative execution side-channel vulnerabilities.
The Meltdown and Spectre exploitation techniques abuse speculative execution to access privileged memory-including that of the kernel-from a less-privileged user process such as a malicious app running on a device.
Please check out the Alternative protections forWindows Server 2016 Hyper-V Hosts against the speculative execution side-channel vulnerabilities.
The Meltdown and Spectre exploitation techniques abuse speculative execution to access privileged memory- including that of the kernel- from a less-privileged user process such as a malicious app running on a device.
A simple shell script to tell if yourLinux installation is vulnerable against the 3“speculative execution” CVEs that were made public early 2018.
Impact: Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis.
Spectre& Meltdown Checker is a simple shell script to tell if yourLinux installation is vulnerable against the 3“speculative execution” CVEs that were made public early 2018.
Impact: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Last Tuesday on May 14 wrote:"On May 14, 2019,Intel published information about a new subclass of speculative execution side channel vulnerabilities known as Microarchitectural Data Sampling.".
Microsoft is aware of a new publiclydisclosed class of vulnerabilities referred to as"speculative execution side-channel attacks" that affect many modern processors and operating systems including Intel, AMD, and ARM.
Lazy restored states are potentially vulnerable to exploits where one process mayinfer register values of other processes through a speculative execution side channel that infers their value.”.
On June 13, 2018,an additional vulnerability involving side channel speculative execution, known as Lazy FP State Restore, was announced and assigned CVE-2018-3665.
On June 13, 2018,an additional vulnerability involving side channel speculative execution, known as Lazy FP State Restore, was announced and assigned CVE-2018-3665.
Microsoft is aware of a new publiclydisclosed class of vulnerabilities referred to as“speculative execution side-channel attacks” that affect many modern processors and operating systems.
Microsoft is aware of a new publicly disclosedclass of vulnerabilities that are referred to as“speculative execution side-channel attacks” that affect many modern processors and operating systems, including chipsets from Intel, AMD, and ARM.