55nmHV MTP Non Volatile Memory for Standard CMOS Logic Process
Industry Expert Blogs
Codasip Processors Not Affected by Meltdown and SpectreCodasip Blog - Roddy UrquhartJan. 10, 2018 |
In the light of recent news about grave processor security issues, Meltdown and Spectre, we would like to assure customers and partners that Codasip processors are not subject to these issues.
Meltdown and Spectre take advantage of a flaw in so-called speculative execution, a feature that allows for faster execution of code. Meltdown exploits the fact that low-privilege code and high-privilege memory are not separated properly during speculative execution, which means that untrusted processes can potentially access kernel memory. Spectre goes a different way with similar results: A potential attack makes the processor execute specific speculative scenario, making it possible to read the memory of the executed program.
Both issues effectively mean that privilege can be bypassed and virtually any part of memory can leak, including the most restricted.