Speculative execution is an optimization technique where a computer system performs some task that may not be needed. Work is done before it is known...
8 KB (978 words) - 11:44, 25 May 2025
Transient execution CPU vulnerabilities are vulnerabilities in which instructions, most often optimized using speculative execution, are executed temporarily...
72 KB (5,282 words) - 10:39, 16 July 2025
security vulnerability and its exploitation that takes advantage of speculative execution in a similar way to the Meltdown and Spectre security vulnerabilities...
13 KB (869 words) - 01:53, 18 November 2024
Spectre (security vulnerability) (category Transient execution CPU vulnerabilities)
Spectre is one of the speculative execution CPU vulnerabilities which involve side-channel attacks. These affect modern microprocessors that perform branch...
83 KB (7,089 words) - 17:59, 16 June 2025
executed later in parallel with the normal execution on a separate independent thread. Such a speculative thread may need to make assumptions about the...
13 KB (1,177 words) - 22:39, 13 June 2025
dedicated to public speaking and literary composition, founded in 1764 Speculative execution, in computer systems is doing work, the result of which may not...
3 KB (391 words) - 19:44, 19 December 2024
Retbleed (category Transient execution CPU vulnerabilities)
Retbleed is a speculative execution attack on x86-64 and ARM processors, including some recent Intel and AMD chips. First made public in 2022, it is a...
4 KB (305 words) - 09:13, 15 August 2024
Meltdown (security vulnerability) (category Transient execution CPU vulnerabilities)
Meltdown is one of the two original speculative execution CPU vulnerabilities (the other being Spectre). Meltdown affects Intel x86 microprocessors, IBM...
87 KB (8,241 words) - 14:35, 26 December 2024
Downfall (security vulnerability) (category Transient execution CPU vulnerabilities)
x86-64 microprocessors. It is a transient execution CPU vulnerability which relies on speculative execution of Advanced Vector Extensions (AVX) instructions...
8 KB (570 words) - 12:20, 10 May 2025
Foreshadow (category Transient execution CPU vulnerabilities)
disclosed to the public on 14 August 2018. The vulnerability is a speculative execution attack on Intel processors that may result in the disclosure of...
22 KB (1,943 words) - 13:13, 19 November 2024
of security vulnerabilities were found in the implementations of speculative execution on common processor architectures which effectively enabled an elevation...
3 KB (295 words) - 20:51, 30 September 2022
Spoiler (security vulnerability) (category Transient execution CPU vulnerabilities)
computer central processing units that use speculative execution. It exploits side-effects of speculative execution to improve the efficiency of Rowhammer...
3 KB (195 words) - 09:13, 15 August 2024
specialized) execution units. These modern x86 designs are thus pipelined, superscalar, and also capable of out of order and speculative execution (via branch...
105 KB (10,898 words) - 22:59, 15 July 2025
Pacman (security vulnerability) (category Transient execution CPU vulnerabilities)
exception thrown during speculative execution forces the CPU to stall, preventing further instructions from being speculatively executed. A Pacman gadget...
14 KB (1,392 words) - 08:08, 30 June 2025
determined. Several other forms of speculative execution have been proposed and are in use, including speculative execution driven by value prediction, memory...
9 KB (1,026 words) - 00:26, 27 January 2025
the outcome of a branch. Execution continues along the predicted path for the program but instructions are tagged as speculative. If the guess turns out...
12 KB (1,609 words) - 20:23, 6 June 2025
Imperial College London showed a proof of concept that the Spectre speculative execution security vulnerability can be adapted to attack the secure enclave...
22 KB (2,135 words) - 18:53, 16 May 2025
CPU cache (section Speculative execution)
issued and continue execution until the data are returned from main memory, and the dependent instructions can resume execution. Cache write misses to...
99 KB (13,735 words) - 12:24, 8 July 2025
Superscalar processor (redirect from Superscalar execution)
rigid methods used in the simpler P5 Pentium; it also simplified speculative execution and allowed higher clock frequencies compared to designs such as...
14 KB (1,678 words) - 19:56, 4 June 2025
SWAPGS (security vulnerability) (category Transient execution CPU vulnerabilities)
prediction used in modern microprocessors. Most processors use a form of speculative execution, this feature allows the processors to make educated guesses about...
6 KB (581 words) - 03:53, 6 February 2025
higher Transient execution CPU vulnerabilities are vulnerabilities in which instructions, most often optimized using speculative execution, are executed...
276 KB (9,916 words) - 02:51, 3 July 2025
In computer engineering, out-of-order execution (or more formally dynamic execution) is an instruction scheduling paradigm used in high-performance central...
36 KB (4,203 words) - 14:15, 11 July 2025
Microarchitecture (section Increasing execution speed)
high amount of stalling. Techniques such as branch prediction and speculative execution are used to lessen these branch penalties. Branch prediction is...
27 KB (3,576 words) - 23:42, 21 June 2025
time. In June 2022, MIT researchers announced they had found a speculative execution vulnerability in M1 chips which they called "Pacman" after pointer...
34 KB (2,957 words) - 03:34, 29 April 2025
journals in the early 1990s that described how an out-of-order with speculative execution CPU might be designed. This was one of the first publicly disclosed...
6 KB (807 words) - 22:30, 3 September 2024
increase ILP: Predicated execution is used to decrease the occurrence of branches and to increase the speculative execution of instructions. In this feature...
8 KB (879 words) - 17:44, 6 November 2024
to the technologies of superscalar execution, operand forwarding, speculative execution and out-of-order execution. Graphics pipelines, found in most...
15 KB (2,207 words) - 16:47, 23 February 2025
instructions, ARMv8.4-A's dot product instructions, and ARMv8.5-A's speculative execution controls such as SSBS, CSDB, SSBB, and PSSBB. Memory bandwidth is...
9 KB (723 words) - 23:48, 16 June 2025
any instruction reordering, speculative execution or register renaming. A side effect of having no speculative execution is invulnerability against Meltdown...
26 KB (2,450 words) - 00:47, 13 June 2025
improve performance via register renaming, allowing parallel and speculative execution. Modern x86 design acquired these techniques around 1995 with the...
37 KB (1,811 words) - 15:31, 1 May 2025