![]() ![]() It is probably a good idea to review exactly what the issue that Google’s Project Zero team found last June and revealed in January, ahead of when it wanted to, because rumors about the potential security holes were going around, particularly as they related to server virtualization hypervisors on X86 platforms. (More on this after we go into the benchmark results.) The insight has come to us just as Brian Krzanich, chief executive officer at Intel, has told PC and server buyers that the company will be adding features in its next generation of Core and Xeon processors to perform some of the tasks done in these mitigation efforts in silicon rather than in system software and microcode. The Next Platform caught wind of these initial benchmark test results, which were done to try to quantify the performance impact of the Spectre and Meltdown security vulnerability patches to both system microcode and operating system kernels. In other cases, the impact is quite severe. But according to sources familiar with recent tests done by Intel, the impact is not as bad as one might think in many cases. The initial microbenchmark results on the mitigations for these security holes, put out by Red Hat, showed the impact could be quite dramatic. It has been more than two months since Google revealed its research on the Spectre and Meltdown speculative execution security vulnerabilities in modern processors, and caused the whole IT industry to slam on the brakes and brace for the impact.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |