Mill vs. Spectre - Performance and Security

Mill vs. Spectre - Performance and Security

Strange Loop Conference via YouTube Direct link

Number fourteen of a series

1 of 22

1 of 22

Number fourteen of a series

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Mill vs. Spectre - Performance and Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Number fourteen of a series
  2. 2 Dramatis personae
  3. 3 The plot
  4. 4 To steal a secret...
  5. 5 Access vs. Exfiltration
  6. 6 Speculative execution
  7. 7 How to drive a branch predictor
  8. 8 Our story so far
  9. 9 On caches and cache pollution
  10. 10 Meanwhile, back at the Lair
  11. 11 Some details
  12. 12 Mitigation
  13. 13 Memory hierarchy from 40,000 ft.
  14. 14 The load problem
  15. 15 Mill "deferred loads"
  16. 16 Reordering constraints
  17. 17 What if speculation gets in trouble?
  18. 18 (Non-)speculable operations
  19. 19 Speculation compared
  20. 20 The Mill protection model
  21. 21 Credits
  22. 22 Disclaimer

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.