Results 11 to 20 of about 745,564 (237)
Speculative interference attacks: breaking invisible speculation schemes [PDF]
Updated CR ...
Mohammad Behnia +15 more
openaire +4 more sources
Revizor: Testing Black-Box CPUs Against Speculation Contracts [PDF]
Speculative execution attacks such as Spectre and Meltdown exploit microarchitectural optimizations to leak information across security domains. These vulnerabilities often stay undetected for years because we lack the tools for systematic analysis of ...
O. Oleksenko +3 more
semanticscholar +1 more source
The Sixth Mass Extinction: fact, fiction or speculation?
There have been five Mass Extinction events in the history of Earth's biodiversity, all caused by dramatic but natural phenomena. It has been claimed that the Sixth Mass Extinction may be underway, this time caused entirely by humans.
R. Cowie, P. Bouchet, B. Fontaine
semanticscholar +1 more source
Hardware-Software Contracts for Secure Speculation [PDF]
Since the discovery of Spectre, a large number of hardware mechanisms for secure speculation has been proposed. Intuitively, more defensive mechanisms are less efficient but can securely execute a larger class of programs, while more permissive ...
M. Guarnieri +3 more
semanticscholar +1 more source
Distrust or Speculation? The Socioeconomic Drivers of U.S. Cryptocurrency Investments
Employing representative data from the U.S. Survey of Consumer Payment Choice, we disprove the hypothesis that cryptocurrency investors are motivated by distrust in fiat currencies or regulated finance.
Raphael A. Auer, David Tercero-Lucas
semanticscholar +1 more source
Two Years or More of Co-speculation: Polylogues of Philosophers, Designers, and a Tilting Bowl
This article investigates new relations with things that are expansive and inclusive of the pluralities and differences within our entanglements with technologies.
Ron Wakkary, Doenja Oogjes, Armi Behzad
semanticscholar +1 more source
Speculation: a political economy of technologies of imagination
This introduction explores how to build a critical analysis of post-crisis capitalism by moving beyond Marx, Foucault and Callon's approaches. This is crucially important because powerful technocratic institutions and the discipline of economics are ...
Laura Bear
semanticscholar +1 more source
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation [PDF]
Speculative attacks, such as Spectre and Meltdown, target speculative execution to access privileged data and leak it through a side-channel. In this paper, we introduce (SafeSpec), a new model for supporting speculation in a way that is immune to the ...
Khaled N. Khasawneh +5 more
semanticscholar +1 more source
Speculative Authorization [PDF]
As enterprises aim towards achieving zero latency for their systems, latency introduced by authorization process can act as an obstacle towards achieving their goal. We present \emph{\underline{Sp}eculative \underline{A}uthorizatio\underline{n}} (SPAN), a prediction technique to address the problem of latency in enterprise authorization systems.
Kini, Pranab, Beznosov, Konstantin
openaire +1 more source
SpecMCTS: Accelerating Monte Carlo Tree Search Using Speculative Tree Traversal
Monte Carlo Tree Search (MCTS) algorithms show outstanding strengths in decision-making problems such as the game of Go. However, MCTS requires significant computing loads to evaluate many nodes in the decision tree to make a good decision. Parallelizing
Juhwan Kim, Byeongmin Kang, Hyungmin Cho
doaj +1 more source

