• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Thursday, August 21, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News Science

Eliminating infamous security threats

Bioengineer by Bioengineer
June 12, 2019
in Science
Reading Time: 3 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Speculative memory side-channel attacks are security vulnerabilities in computers for which no efficient solutions have been found. Existing solutions only address specific security threats without solving the underlying issue.

Speculative side-channel attacks exploit a fundamental functionality in microprocessors to expose security vulnerabilities. The first such security threats, Meltdown and Spectre, were announced last year, but many more have been discovered since. Previous security solutions have been limited and often incurred a high performance penalty.

Now, researchers from Uppsala University, NTNU, and University of Murcia have come up with a more appealing solution, which will be presented at the prestigious International Symposium on Computer Architecture (ISCA) at the end of June. https://iscaconf.org/isca2019/

— Our solution reduces the performance and energy costs, and increases the security of the computer system, when compared to previous solutions, says Christos Sakalis, PhD student at Uppsala University.

Speculation Exploited

The security vulnerability manifests when the microprocessor tries to guess (speculate) on what to do next. If the microprocessor guesses incorrectly (misspeculates), it will undo any work it has done and start anew. Speculation lies at the core of today’s high-performance microprocessors and it is necessary for taking full advantage of the microprocessors’ capabilities.

— In theory, any misspeculations should not leave any visible traces, but they do leave traces nonetheless, says Alexandra Jimborean from Uppsala University.

These traces are exploited by Meltdown and Spectre to retrieve information through so called side-channels. The information can be used to circumvent security checks in the microprocessor to access, e.g., passwords and encryption keys. This has proven to be an “Achilles heel for computer security.” The work to find methods to prevent such attacks has been intense, involving people and institutions all over the world. Finally, we now have an efficient solution to the problem.

Different Speculation

Christos Sakalis, Stefanos Kaxiras, Alberto Ros, Alexandra Jimborean, and Magnus Själander have been working together to come up with a new solution.

— We have developed a new method that completely hides the speculation, says Stefanos Kaxiras from the Uppsala Architecture Research Team at Uppsala University.

The proposed method delays part of the speculation and uses another form of speculation to predict the expected value. This form of speculation is completely invisible.

All this is achieved without reducing the performance of the processors more than 11% and with only a 7% energy usage increase. An earlier proposed solution reduced the performance of the processor by 46% and increased the energy usage by 51%.

— Our solution requires relatively small modifications to existing processor designs, which in combination with the low performance reduction makes our method practical to employ in future microprocessors, says Magnus Själander from NTNU’s Department of Computer Science.

###

Christos Sakalis, Stefanos Kaxiras, Alberto Ros, Alexandra Jimborean, and Magnus Sja?lander. 2019. “Efficient Invisible Speculative Execution through Selective Delay and Value Prediction”. In The 46th Annual International Symposium on Computer Architecture (ISCA ’19), June 22-26, 2019, Phoenix, AZ, USA. ACM, New York, NY, USA, 13 pages.
https://doi.org/10.1145/3307650.3322216

Media Contact
Magnus Själander
[email protected]

Related Journal Article

https://doi.org/10.1145/3307650.3322216
http://dx.doi.org/10.1145/3307650.3322216

Tags: Computer ScienceSystem Security/HackersTechnology/Engineering/Computer Science
Share13Tweet8Share2ShareShareShare2

Related Posts

Five or more hours of smartphone usage per day may increase obesity

July 25, 2019
IMAGE

NASA’s terra satellite finds tropical storm 07W’s strength on the side

July 25, 2019

NASA finds one burst of energy in weakening Depression Dalila

July 25, 2019

Researcher’s innovative flood mapping helps water and emergency management officials

July 25, 2019
Please login to join discussion

POPULAR NEWS

  • blank

    Molecules in Focus: Capturing the Timeless Dance of Particles

    141 shares
    Share 56 Tweet 35
  • Neuropsychiatric Risks Linked to COVID-19 Revealed

    81 shares
    Share 32 Tweet 20
  • Modified DASH Diet Reduces Blood Sugar Levels in Adults with Type 2 Diabetes, Clinical Trial Finds

    60 shares
    Share 24 Tweet 15
  • Predicting Colorectal Cancer Using Lifestyle Factors

    47 shares
    Share 19 Tweet 12

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Revolutionary Laser Technique Simplifies Production of High-Performance Alloy Films

New Study Reveals 40% Decline in Leisure Reading Over Two Decades

TCF1 and LEF1 Sustain B-1a Cell Function

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.