{"id":3159,"date":"2018-06-16T02:21:38","date_gmt":"2018-06-16T02:21:38","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/"},"modified":"2018-06-16T02:21:38","modified_gmt":"2018-06-16T02:21:38","slug":"boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/","title":{"rendered":"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix"},"content":{"rendered":"<p>A group of computer science researchers has proposed a way to overcome the security risk posed by speculative execution, the data processing technique behind the Spectre and Meltdown vulnerabilities.<\/p>\n<p>In <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/arxiv.org\/pdf\/1806.05179.pdf\">a paper<\/a> distributed this week through the ArXiv preprint server, &#8220;SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation,&#8221; computer scientists from University of California, Riverside, College of William and Mary and Binghamton University describe a way to isolate the artifacts produced by speculative execution so that they can&#8217;t be used to glean privileged data.<\/p>\n<p>SafeSpec is &#8220;a design principle where speculative state is stored in temporary structures that are not accessible by committed instructions,&#8221; the paper \u2013 co-authored by Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh \u2013 explains.<\/p>\n<p>These temporary or &#8220;shadow structures,&#8221; as the paper calls them, revise the memory hierarchy in a way that prevents speculation attacks.<\/p>\n<p>&#8220;In particular, we expand the load-store queues to store a pointer to a temporary associative structure that holds speculatively loaded cache lines,&#8221; the paper says. &#8220;We also introduce a similar structure to hold speculatively loaded TLB (translation lookaside buffer) entries.&#8221;<\/p>\n<p>The researchers claim their approach fixes currently known attack variations based on the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/04\/intel_amd_arm_cpu_vulnerability\/\">Spectre and Meltdown data-leaking flaws<\/a>, as well as a new class of attack they introduce called transient speculation attacks \u2013 which they claim can be mitigated by altering the size of the shadow structures used to isolate the speculatively generated data.<\/p>\n<h3 class=\"crosshead\"><span>Speculating on security<\/span><\/h3>\n<p>Most modern computer chips employ speculative execution for speed. To fully utilize their ability to process groups of instructions in parallel, they employ a branch predictor to guess which path a program will take and then execute an expected set of instructions before it&#8217;s needed.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/06\/13\/shutterstock_unlocked_chip.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"An unlocked padlock on a chip, hint hint\"\/><\/p>\n<h2 title=\"Malware on Cores, Xeons may lift computations, mitigations in place or coming\">Intel chip flaw: Math unit may spill crypto secrets to apps \u2013 modern Linux, Windows, BSDs immune<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/06\/13\/intel_lazy_fpu_state_security_flaw\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>When the program follows the anticipated path, the work has already been done, saving time; if the branch predictor guessed wrong, the resulting data simply gets discarded.<\/p>\n<p>The problem with this technique, as <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/01\/04\/intel_amd_arm_cpu_vulnerability\/\">chipmakers acknowledged earlier this year<\/a>, is that code being processed under speculative execution is not subject to the same privilege checks as other instructions.<\/p>\n<p>As a result, side-channel attacks can be devised to look beyond user memory into kernel memory.<\/p>\n<p>Initially there were two Spectre variants (CVE 2017-5753 and 2017-5715) and one Meltdown variant (2017-5754). Three others have surfaced (2018-3640, 2018-3639, 2018-3665) since then and there may well be more to come.<\/p>\n<p>These vulnerabilities have been addressed through adding the LFENCE instruction to compilers, processor interfaces added through microcode updates (IBRS, STIBP, IBPB), changes to the Windows, Linux, and macOS operating systems, Kernel Page-Table Isolation (KPTI), Return Trampoline (Retpoline), and PoisonIvy.<\/p>\n<p>For the time being at least. The paper says Intel engineers have acknowledged that pending chip architecture changes will break Retpoline, Google&#8217;s defense against the indirect branch target injection attacks know as Spectre variant 2. This footnote evidently wasn&#8217;t intended for publication and may not persist in subsequent revisions.)<\/p>\n<p>Whatever the case, SafeSpec promises to make speculative execution great again.<\/p>\n<h3 class=\"crosshead\"><span>More work for Intel<\/span><\/h3>\n<p><em>The Register<\/em> asked Intel for comment but the company wasn&#8217;t able to make anyone available prior to publication. We understand, however, that the company is aware of this work.<\/p>\n<p>The research, if validated and adopted, means more work for Intel and other chip makers.<\/p>\n<p>&#8220;SafeSpec requires a deep redesign of the CPU to separate out the speculative state from the permanent state,&#8221; the paper explains.<\/p>\n<p>In a phone interview with <em>The Register<\/em>, Nael Abu-Ghazaleh, professor of computer science and engineering at UC Riverside and a co-author of the paper, said he believes SafeSpec can defend against the recently disclosed <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/06\/13\/intel_lazy_fpu_state_security_flaw\/\">Lazy FP state bug<\/a> affecting Intel math processors.<\/p>\n<p>&#8220;Like the other variants of Spectre\/Meltdown, the speculatively accessed floating point state would go to the shadow state, but not make it to the visible architectural state, preventing the attack,&#8221; he said.<\/p>\n<p>It also addresses another recently disclosed variant, Speculative Store Bypass (variant 4). &#8220;The good thing about it is it doesn&#8217;t care about the source of the speculation,&#8221; he said.<\/p>\n<p>Abu-Ghazaleh acknowledged that SafeSpec requires some extra space on the L1 cache, but he considers the hardware changes to be minimal. And in terms of performance, he said, SafeSpec could even offer small improvements.<\/p>\n<p>&#8220;I think it&#8217;s really practical in terms of overhead,&#8221; he said.<\/p>\n<p>It&#8217;s not a complete fix. As the paper acknowledges, other silicon structures affected by speculative instructions like the branch predictor and DRAM buffers also need to be fortified.<\/p>\n<p>But it might just be better than past patches. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/06\/16\/speculative_execution_spectre_meltdown\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Good thing too because Intel&#8217;s planned chip changes may break Google&#8217;s Retpoline A group of computer science researchers has proposed a way to overcome the security risk posed by speculative execution, the data processing technique behind the Spectre and Meltdown vulnerabilities.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3160,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-3159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-16T02:21:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix\",\"datePublished\":\"2018-06-16T02:21:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/\",\"name\":\"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg\",\"datePublished\":\"2018-06-16T02:21:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/","og_locale":"en_US","og_type":"article","og_title":"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-16T02:21:38+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix","datePublished":"2018-06-16T02:21:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/"},"wordCount":796,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/","url":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/","name":"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg","datePublished":"2018-06-16T02:21:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/boffins-offer-to-make-speculative-execution-great-again-with-spectre-meltdown-cpu-fix\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3159"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3159\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3160"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}