Completed
Access vs. Exfiltration
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Mill vs. Spectre - Performance and Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Number fourteen of a series
- 2 Dramatis personae
- 3 The plot
- 4 To steal a secret...
- 5 Access vs. Exfiltration
- 6 Speculative execution
- 7 How to drive a branch predictor
- 8 Our story so far
- 9 On caches and cache pollution
- 10 Meanwhile, back at the Lair
- 11 Some details
- 12 Mitigation
- 13 Memory hierarchy from 40,000 ft.
- 14 The load problem
- 15 Mill "deferred loads"
- 16 Reordering constraints
- 17 What if speculation gets in trouble?
- 18 (Non-)speculable operations
- 19 Speculation compared
- 20 The Mill protection model
- 21 Credits
- 22 Disclaimer