Spectre
(#88871930)
Level 1 Coatl
Click or tap to view this dragon in Predict Morphology.
Energy: 48/50
Expand the dragon details section.
Collapse the dragon details section.
Personal Style
Apparel
Skin
Scene
Measurements
Length
7.76 m
Wingspan
6.92 m
Weight
1038.44 kg
Genetics
Antique
Fade
Fade
Antique
Blend
Blend
Black
Points
Points
Hatchday
Breed
Eye Type
Level 1 Coatl
EXP: 0 / 245
STR
6
AGI
7
DEF
6
QCK
7
INT
7
VIT
5
MND
6
Biography
Spectre
Spectre refers to one of the two original transient execution CPU vulnerabilities (the other being Meltdown), which involve microarchitectural timing side-channel attacks. These affect modern microprocessors that perform branch prediction and other forms of speculation. On most processors, the speculative execution resulting from a branch misprediction may leave observable side effects that may reveal private data to attackers. For example, if the pattern of memory accesses performed by such speculative execution depends on private data, the resulting state of the data cache constitutes a side channel through which an attacker may be able to extract information about the private data using a timing attack.
Two Common Vulnerabilities and Exposures IDs related to Spectre, CVE-2017-5753 (bounds check bypass, Spectre-V1, Spectre 1.0) and CVE-2017-5715 (branch target injection, Spectre-V2), have been issued.
JIT engines used for JavaScript were found to be vulnerable. A website can read data stored in the browser for another website, or the browser's memory itself.
In early 2018, Intel reported that it would redesign its CPUs to help protect against the Spectre and related Meltdown vulnerabilities (especially, Spectre variant 2 and Meltdown, but not Spectre variant 1).
On 8 October 2018, Intel was reported to have added hardware and firmware mitigations regarding Spectre and Meltdown vulnerabilities to its latest processors.
Spectre refers to one of the two original transient execution CPU vulnerabilities (the other being Meltdown), which involve microarchitectural timing side-channel attacks. These affect modern microprocessors that perform branch prediction and other forms of speculation. On most processors, the speculative execution resulting from a branch misprediction may leave observable side effects that may reveal private data to attackers. For example, if the pattern of memory accesses performed by such speculative execution depends on private data, the resulting state of the data cache constitutes a side channel through which an attacker may be able to extract information about the private data using a timing attack.
Two Common Vulnerabilities and Exposures IDs related to Spectre, CVE-2017-5753 (bounds check bypass, Spectre-V1, Spectre 1.0) and CVE-2017-5715 (branch target injection, Spectre-V2), have been issued.
JIT engines used for JavaScript were found to be vulnerable. A website can read data stored in the browser for another website, or the browser's memory itself.
In early 2018, Intel reported that it would redesign its CPUs to help protect against the Spectre and related Meltdown vulnerabilities (especially, Spectre variant 2 and Meltdown, but not Spectre variant 1).
On 8 October 2018, Intel was reported to have added hardware and firmware mitigations regarding Spectre and Meltdown vulnerabilities to its latest processors.
Click or tap a food type to individually feed this dragon only. The other dragons in your lair will not have their energy replenished.
This dragon doesn't eat Insects.
This dragon doesn't eat Meat.
Feed this dragon Seafood.
This dragon doesn't eat Plants.
Exalting Spectre to the service of the Lightweaver will remove them from your lair forever. They will leave behind a small sum of riches that they have accumulated. This action is irreversible.
Do you wish to continue?
- Names must be longer than 2 characters.
- Names must be no longer than 16 characters.
- Names can only contain letters.
- Names must be no longer than 16 characters.
- Names can only contain letters.