Spectre mitigations in MSVC—Andrew Pardoe

Save to:
Instapaper Pocket Readability

If you are a developer whose code operates on data that crosses a trust boundary then you should consider recompiling your code with the /Qspectre switch:

Spectre mitigations in MSVC

by Andrew Pardoe

From the article:

Microsoft is aware of a new publicly disclosed class of vulnerabilities, called “speculative execution side-channel attacks,” that affect many operating systems and modern processors, including processors from Intel, AMD, and ARM...

Add a Comment

Comments are closed.

Comments (0)

There are currently no comments on this entry.