Publication | Open Access
Isolation and Beyond
11
Citations
66
References
2019
Year
Unknown Venue
System security has historically relied on hardware-provided isolation primitives. However, Meltdown [36] and Spectre [30] demonstrate that basic user/kernel isolation could be bypassed in every widely deployed ISA for decades; they are a caution to system designers who accept hardware isolation guarantees as an article of faith. Hardware isolation is fallible and should be considered fallible by software systems.
| Year | Citations | |
|---|---|---|
Page 1
Page 1