Computer and Network Security

Table of Contents

Lecture 13: advanced exploitation 2

BlindSide

Speculative execution

Spectre vulnerability

Hacking blind

BlindSide:

Newton: