|
|
Subscribe / Log in / New account

A year with Spectre: a V8 perspective

A year with Spectre: a V8 perspective

[Security] Posted Apr 23, 2019 13:29 UTC (Tue) by corbet

Here's an article on the V8 blog describing the work that was done to mitigate Spectre vulnerabilities in the V8 JavaScript engine. "Our research reached the conclusion that, in principle, untrusted code can read a process’s entire address space using Spectre and side channels. Software mitigations reduce the effectiveness of many potential gadgets, but are not efficient or comprehensive. The only effective mitigation is to move sensitive data out of the process’s address space."

Comments (none posted)


Copyright © 2019, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds