Today, Google Project Zero published details of a class of vulnerabilities which can be exploited by speculative execution side-channel attacks. These techniques can be used via JavaScript code running in the browser, which may allow attackers to gain access to memory in the attacker’s process...
attack prevention
browser security
cpu cache
fall creators
internet explorer
javascript
john hazen
kb4056890
memory access
microsoft edge
mitigations
performance
project zero
security updates
sharedarraybuffer
side-channel
speculative execution
updates
vulnerabilities
windows 10
JavaScript performance has always been a core area of focus for our team. Every release, we look for opportunities to improve end users’ browsing experience on real workloads with shorter start-up time, faster execution, and leaner memory usage. These efforts are guided by invaluable ongoing...