Hardware security bug: Difference between revisions

Content deleted Content added
See also: added foreshadow
that does not apply to the general concept
Line 22:
| quote = ''[sic]:'' The effects of these vulnerabilities are catastrophic: « at best, the vulnerability can be used by malwares and hackers to exploit other security linked bugs. At worse, the flaw can be used by softwares and authentified users to read the kernel’s memory
| accessdate = February 4, 2019
}} </ref>
}} </ref> These vulnerabilities are based on exploiting side effects of [[speculative execution]], a technique used by many high performance CPUs to improve processing speed.
 
== See also ==