Linked by pmac on Tue 22nd May 2018 09:47 UTC
General Development

In the wake of the recent Meltdown and Spectre vulnerabilities, it's worth spending some time looking at root causes. Both of these vulnerabilities involved processors speculatively executing instructions past some kind of access check and allowing the attacker to observe the results via a side channel. The features that led to these vulnerabilities, along with several others, were added to let C programmers continue to believe they were programming in a low-level language, when this hasn't been the case for decades.

Processor vendors are not alone in this. Those of us working on C/C++ compilers have also participated.

Permalink for comment 657142
To read all comments associated with this story, please click here.
RE[2]: gatekeeping
by grat on Tue 22nd May 2018 14:32 UTC in reply to "RE: gatekeeping"
Member since:

Congratulations-- You provided a link to the article this topic was posted about.

Well done!

Aside from that, what the article is really saying is that there is no such thing as a low level language anymore, because they crafted a definition which excludes all languages included assembly.

Reply Parent Score: 4