1 code implementation • 19 Jun 2018 • Julian Stecklina, Thomas Prescher
As an optimization, the operating system can defer the context switch of the FPU and SIMD register set until the first instruction is executed that needs access to these registers.
Operating Systems Hardware Architecture Cryptography and Security
2 code implementations • 3 Jan 2018 • Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
The security of computer systems fundamentally relies on memory isolation, e. g., kernel address ranges are marked as non-accessible and are protected from user access.
Cryptography and Security