This post was originally published on this site

Posted by Matt Linton, Senior Security Engineer and Pat Parseghian, Technical Program Manager

Yesterday, Google’s Project Zero team posted detailed technical information on three variants of a new security issue involving speculative execution on many modern CPUs. Today, we’d like to share some more information about our mitigations and performance.

In response to the vulnerabilities that were discovered we developed a novel mitigation called “Retpoline” — a binary modification technique that protects against “branch target injection” attacks. We shared Reptoline with our industry partners and have deployed it on Google’s systems, where we have observed negligible impact on performance.

In addition, we have

This post first appeared on Google security. Read the original article.

About The Author

Related Posts