Open Access

Self-Spectre, Write-Execute and the Hidden State

   | Aug 15, 2019

Cite

[1] KOCHER, P.—GENKIN, D.—GRUSS, D.—HAAS, W.—HAMBURG, M.—LIPP, M. –MANGARD, S.—PRESCHER, T.—SCHWARZ, M.—YAROM, Y.: Spectre attacks: Exploiting speculative execution, CoRR, abs/1801.01203, 2018.Search in Google Scholar

[2] SWANSON, S.—MCDOWELL, L. K.—SWIFT, M. M.—EGGERS, S. J.—LEVY H. M.: An evaluation of speculative instruction execution on simultaneous multithreaded processors, ACM Trans. Comput. Syst. 21 (2003), 314–340.10.1145/859716.859720Open DOISearch in Google Scholar

[3] NORDIN, P.—BANZHAF, W.: Evolving turing-complete programs for a register machine with self-modifying code. In: Proc. of the 6th Internat. Conf. on Genetic Algorithms, Pittsburgh, PA, USA, 1995, Morgan Kaufmann Publ., San Francisco, CA, 1995, pp. 318–327.Search in Google Scholar

[4] MORSE, G.: Pure infinitely self-modifying code is realizable and turing-complete, Inter-nat. J. Electron. Telecomm. 64 (2018), 123–129.Search in Google Scholar

[5] AUGUST, E.: Spectre attacks: exploiting speculative execution,https://github.com/crozone/SpectrePoC. [Accessed: 2018.03.30].Search in Google Scholar

[6] Using Intel AES-NI and c++ threads to search an AES128 key, https://github.com/sebastien-riou/aes-brute-force. [Accessed: 2018.06.01].Search in Google Scholar

eISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics