Rebooting Computers to Avoid Meltdown and Spectre
Abstract
Security vulnerabilities such as Meltdown and Spectre demonstrate how chip complexity grew faster than our ability to manage unintended consequences. Here, attention to security from the outset should be part of the rememdy, yet complexity must be controlled at a more fundamental level.
- Authors:
-
- Georgia Inst. of Technology, Atlanta, GA (United States)
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
- Technion - Israel Institute of Technology, Haifa (Israel)
- Hewlett Packard Labs, Palo Alto, CA (United States)
- Publication Date:
- Research Org.:
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
- Sponsoring Org.:
- USDOE National Nuclear Security Administration (NNSA)
- OSTI Identifier:
- 1459993
- Report Number(s):
- SAND2018-6948J
Journal ID: ISSN 0018-9162; 665142
- Grant/Contract Number:
- AC04-94AL85000
- Resource Type:
- Accepted Manuscript
- Journal Name:
- Computer
- Additional Journal Information:
- Journal Volume: 51; Journal Issue: 4; Journal ID: ISSN 0018-9162
- Publisher:
- IEEE
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; rebooting computing; meltdown; spectre; security; complexity; hardware; state machine abstraction; hackers
Citation Formats
Conte, Thomas M., Debenedictis, Erik P., Mendelson, Avi, and Milojicic, Dejan. Rebooting Computers to Avoid Meltdown and Spectre. United States: N. p., 2018.
Web. doi:10.1109/MC.2018.2141022.
Conte, Thomas M., Debenedictis, Erik P., Mendelson, Avi, & Milojicic, Dejan. Rebooting Computers to Avoid Meltdown and Spectre. United States. https://doi.org/10.1109/MC.2018.2141022
Conte, Thomas M., Debenedictis, Erik P., Mendelson, Avi, and Milojicic, Dejan. Fri .
"Rebooting Computers to Avoid Meltdown and Spectre". United States. https://doi.org/10.1109/MC.2018.2141022. https://www.osti.gov/servlets/purl/1459993.
@article{osti_1459993,
title = {Rebooting Computers to Avoid Meltdown and Spectre},
author = {Conte, Thomas M. and Debenedictis, Erik P. and Mendelson, Avi and Milojicic, Dejan},
abstractNote = {Security vulnerabilities such as Meltdown and Spectre demonstrate how chip complexity grew faster than our ability to manage unintended consequences. Here, attention to security from the outset should be part of the rememdy, yet complexity must be controlled at a more fundamental level.},
doi = {10.1109/MC.2018.2141022},
journal = {Computer},
number = 4,
volume = 51,
place = {United States},
year = {2018},
month = {4}
}
Free Publicly Available Full Text
Publisher's Version of Record
Other availability
Figures / Tables:

All figures and tables
(2 total)
Save to My Library
You must Sign In or Create an Account in order to save documents to your library.
Works referencing / citing this record:
Exploration for Software Mitigation to Spectre Attacks of Poisoning Indirect Branches
journal, September 2018
- Chen, Baozi; Wu, Qingbo; Tan, Yusong
- IETE Technical Review, Vol. 35, Issue sup1
Figures/Tables have been extracted from DOE-funded journal article accepted manuscripts.