Meltdown:Reading Kernel Memory from User Space 论文中英对照

论坛 期权论坛     
选择匿名的用户   2021-5-22 15:03   0   0
<p id="main-toc"><strong>Meltdown:Reading Kernel Memory from User Space</strong> 翻译目录</p>
<p id="%E6%91%98%E8%A6%81%EF%BC%88Abstract%EF%BC%89-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#%E6%91%98%E8%A6%81%EF%BC%88Abstract%EF%BC%89">摘要(Abstract)</a></p>
<p id="%E4%B8%80%E3%80%81%E7%AE%80%E4%BB%8B%EF%BC%88Introduction%EF%BC%89-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#%E4%B8%80%E3%80%81%E7%AE%80%E4%BB%8B%EF%BC%88Introduction%EF%BC%89">一、简介(Introduction)</a></p>
<p id="%E4%BA%8C%E3%80%81%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D%EF%BC%88Background%EF%BC%89-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#%E4%BA%8C%E3%80%81%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D%EF%BC%88Background%EF%BC%89">二、背景介绍(Background)</a></p>
<p id="1%E3%80%81%E4%B9%B1%E5%BA%8F%E6%89%A7%E8%A1%8C%EF%BC%88Out-of-order%20execution%EF%BC%89-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#1%E3%80%81%E4%B9%B1%E5%BA%8F%E6%89%A7%E8%A1%8C%EF%BC%88Out-of-order%20execution%EF%BC%89">1、乱序执行(Out-of-order execution)</a></p>
<p id="2%E3%80%81%E5%9C%B0%E5%9D%80%E7%A9%BA%E9%97%B4%EF%BC%88address%20space%EF%BC%89-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#2%E3%80%81%E5%9C%B0%E5%9D%80%E7%A9%BA%E9%97%B4%EF%BC%88address%20space%EF%BC%89">2、地址空间(address space)</a></p>
<p id="3%E3%80%81%E7%BC%93%E5%AD%98%E6%94%BB%E5%87%BB%EF%BC%88Cache%20Attacks%EF%BC%89-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#3%E3%80%81%E7%BC%93%E5%AD%98%E6%94%BB%E5%87%BB%EF%BC%88Cache%20Attacks%EF%BC%89">3、缓存攻击(Cache Attacks)</a></p>
<p id="%E4%B8%89%E3%80%81%E7%AE%80%E5%8D%95%E7%A4%BA%E4%BE%8B%EF%BC%88A%20toy%20example%EF%BC%89-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#%E4%B8%89%E3%80%81%E7%AE%80%E5%8D%95%E7%A4%BA%E4%BE%8B%EF%BC%88A%20toy%20example%EF%BC%89">三、简单示例(A toy example)</a></p>
<p id="%E5%9B%9B%E3%80%81Meltdown%E6%94%BB%E5%87%BB%E6%9E%B6%E6%9E%84%E5%9B%BE%EF%BC%88Building%20block%20ofattack%EF%BC%89-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#%E5%9B%9B%E3%80%81Meltdown%E6%94%BB%E5%87%BB%E6%9E%B6%E6%9E%84%E5%9B%BE%EF%BC%88Building%20block%20ofattack%EF%BC%89">四、Meltdown攻击架构图(Building block ofattack)</a></p>
<p id="1%E3%80%81%E6%89%A7%E8%A1%8C%E7%9E%AC%E6%80%81%E6%8C%87%E4%BB%A4%EF%BC%88executing%20transient%20instructions%EF%BC%89-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#1%E3%80%81%E6%89%A7%E8%A1%8C%E7%9E%AC%E6%80%81%E6%8C%87%E4%BB%A4%EF%BC%88executing%20transient%20instructions%EF%BC%89">1、执行瞬态指令(executing transient instructions)</a></p>
<p id="2%E3%80%81%E6%9E%84%E5%BB%BA%E9%9A%90%E8%94%BD%E9%80%9A%E9%81%93%EF%BC%88building%20covert%20channel%EF%BC%89-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#2%E3%80%81%E6%9E%84%E5%BB%BA%E9%9A%90%E8%94%BD%E9%80%9A%E9%81%93%EF%BC%88building%20covert%20channel%EF%BC%89">2、构建隐蔽通道(building covert channel)</a></p>
<p id="%E4%BA%94%E3%80%81%E7%86%94%E6%96%AD%EF%BC%88Meltdown%EF%BC%89-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#%E4%BA%94%E3%80%81%E7%86%94%E6%96%AD%EF%BC%88Meltdown%EF%BC%89">五、熔断(Meltdown)</a></p>
<p id="1%E3%80%81%E6%A6%82%E8%BF%B0-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#1%E3%80%81%E6%A6%82%E8%BF%B0">1、概述</a></p>
<p id="2%E3%80%81%E4%BC%98%E5%8C%96%E5%92%8C%E9%99%90%E5%88%B6%EF%BC%88optimizations%20and%20limitations%EF%BC%89-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#2%E3%80%81%E4%BC%98%E5%8C%96%E5%92%8C%E9%99%90%E5%88%B6%EF%BC%88optimizations%20and%20limitations%EF%BC%89">2、优化和限制(optimizations and limitations)</a></p>
<p id="%E5%85%AD%E3%80%81%E8%AF%84%E4%BC%B0%EF%BC%88Evaluation%EF%BC%89-toc" style="margin-left:40px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#%E5%85%AD%E3%80%81%E8%AF%84%E4%BC%B0%EF%BC%88Evaluation%EF%BC%89">六、评估(Evaluation)</a></p>
<p id="1%E3%80%81%E5%90%84%E7%A7%8D%E7%8E%AF%E5%A2%83%E4%B8%8B%E7%9A%84%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%EF%BC%88Information%20Leakage%20and%20Environments%EF%BC%89-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#1%E3%80%81%E5%90%84%E7%A7%8D%E7%8E%AF%E5%A2%83%E4%B8%8B%E7%9A%84%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%EF%BC%88Information%20Leakage%20and%20Environments%EF%BC%89">1、各种环境下的信息泄露(Information Leakage and Environments)</a></p>
<p id="2%E3%80%81meltdown%E6%80%A7%E8%83%BD-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#2%E3%80%81meltdown%E6%80%A7%E8%83%BD">2、meltdown性能</a></p>
<p id="3%E3%80%81Meltdown%E5%AE%9E%E6%88%98-toc" style="margin-left:80px;"><a href="https://blog.csdn.net/Jason6620/article/details/107107338#3%E3%80%81Meltdo
分享到 :
0 人收藏
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

积分:3875789
帖子:775174
精华:0
期权论坛 期权论坛
发布
内容

下载期权论坛手机APP