Ret2spec- Speculative Execution Using Return Stack Buffers
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore the security implications of speculative execution in CPUs through this 23-minute conference talk presented at the Association for Computing Machinery (ACM). Delve into the optimization technique of speculative execution, which predicts branch instruction outcomes to enhance pipeline efficiency. Examine the previously understudied security risks associated with this long-standing CPU feature. Learn about return stack buffers, proof of concept demonstrations, execution contexts, and potential countermeasures. Gain insights into a second attack vector and additional protective measures. Conclude with a comprehensive understanding of the ret2spec vulnerability and its significance in modern processor architecture.
Syllabus
Introduction
Caches
Speculative Execution
Return Stack Buffer
Proof of Concept
Execution Context
Countermeasure
Second Attack
Countermeasures
Conclusion
Taught by
Association for Computing Machinery (ACM)
Related Courses
Computer ArchitecturePrinceton University via Coursera Introduction to Computer Architecture
Carnegie Mellon University via Independent Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course)
Hebrew University of Jerusalem via Coursera 计算机系统基础(一) :程序的表示、转换与链接
Nanjing University via Coursera Computer Architecture
Indian Institute of Technology Madras via Swayam