In 2017, researchers discovered a vulnerability in microprocessors used in computers and devices all over the world. The vulnerability, named Spectre, combines side effects from caching and speculative execution, which are techniques that have been used for many years to increase the speed at which computers operate. The discovery upends a number of common assumptions about cybersecurity and draws attention to the complexities of the global supply chain and global customer base for the vast range of devices and cloud capabilities that all computer users rely on. In October 2018, the Forum on Cyber Resilience hosted a workshop to explore the implications of this development. This publication summarizes the presentations and discussions from the workshop.
Table of Contents
|1 Workshop Context and the Story of Spectre||1-12|
|2 Hardware and Software Engineering Assumptions at Risk||13-27|
|3 Implications for Cloud Services and Isolation||28-38|
|4 International Implications, National Security, and Vulnerability Disclosure||39-54|
|5 Concluding Discussion||55-58|
|Appendix A: Workshop Agenda||61-62|
|Appendix B: Planning Committee Biographies||63-66|
|Appendix C: Speaker Biographies||67-72|
The National Academies Press and the Transportation Research Board have partnered with Copyright Clearance Center to offer a variety of options for reusing our content. You may request permission to:
For most Academic and Educational uses no royalties will be charged although you are required to obtain a license and comply with the license terms and conditions.
For information on how to request permission to translate our work and for any other rights related query please click here.
For questions about using the Copyright.com service, please contact:
Copyright Clearance Center
22 Rosewood Drive
Danvers, MA 01923
Tel (toll free): 855/239-3415 (select option 1)
Loading stats for Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop...