Skip to main content

Currently Skimming:

5 Concluding Discussion
Pages 55-58

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 55...
... It was very expensive to repair deployed computers and repeat suspect computations, and it led Intel to adopt a whole new set of techniques for validation of processor designs. Spectre, he suggested, is also going to be a watershed event.
From page 56...
... devices are also a likely vector for many future attacks, thanks to their sheer number and the difficulty of ensuring consistent security for devices manufactured by a multitude of small companies with varying expertise, motivations, and mechanisms for implementing protections, he said. One key takeaway from the workshop, Schneider said, is that computer scientists and manufacturers need to revisit how they understand the contract interface between the hardware and the software and how they view the role that microarchitecture plays.
From page 57...
... As such, Clark argued, a key challenge in hardware development is to avoid missteps that allow attackers to use these devices to kill people or destroy infrastructure. Beyond Spectre 57


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.