Spectre v1: A vulnerability where attackers trick the CPU into speculatively executing code that leaks secret data via cache side-channels
Constant-time: Code execution duration is independent of secret input values, preventing timing attacks
Microwalk: A dynamic analysis tool that detects side-channel leakages by analyzing execution traces and calculating mutual information
LFENCE: A CPU instruction (Load Fence) used to stop speculative execution, often used as a heavy-handed mitigation for Spectre
Spectre gadget: A specific code pattern (usually a conditional branch followed by an array access) vulnerable to Spectre exploitation
Mutual Information (MI): A statistical measure used here to quantify how much information about secret inputs is leaked through execution traces
Speculative execution: A performance optimization where CPUs guess the outcome of branches and execute instructions ahead of time
Zero-shot learning: Using a pre-trained model to perform a task without providing specific training examples in the prompt