The Performance Cost of Security
Historically, performance has been the most important feature when optimizing computer hardware. Modern processors are so highly optimized that every cycle of computation time matters. However, this practice of optimizing for performance at all costs has been called into question by new microarchite...
Main Author: | Bowen, Lucy R |
---|---|
Format: | Others |
Published: |
DigitalCommons@CalPoly
2019
|
Subjects: | |
Online Access: | https://digitalcommons.calpoly.edu/theses/2002 https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=3412&context=theses |
Similar Items
-
Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks
by: Apostolos P. Fournaris, et al.
Published: (2017-07-01) -
Cross-core Microarchitectural Attacks and Countermeasures
by: Irazoki, Gorka
Published: (2017) -
Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre
by: Grimsdal, Gunnar, et al.
Published: (2019) -
Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation
by: Lindqvist, Maria
Published: (2020) -
Spectre: Attack and Defense
by: Harris, Rae
Published: (2019)