-
Mitigating speculative execution side-channel attacks in Microsoft Edge and Internet Explorer
Today, Google Project Zero published details of a class of vulnerabilities which can be exploited by speculative execution side-channel attacks. These techniques can be used via JavaScript code running in the browser, which may allow attackers to gain access to memory in the attacker’s process...- News
- Thread
- attack prevention browser security cpu cache fall creators internet explorer javascript john hazen kb4056890 memory access microsoft edge mitigation performance project zero security updates sharedarraybuffer side-channel speculative execution update vulnerabilities windows 10
- Replies: 0
- Forum: Live RSS Feeds
-
Introducing new JavaScript optimizations, WebAssembly, SharedArrayBuffer, and Atomics in...
JavaScript performance has always been a core area of focus for our team. Every release, we look for opportunities to improve end users’ browsing experience on real workloads with shorter start-up time, faster execution, and leaner memory usage. These efforts are guided by invaluable ongoing...- News
- Thread
- atom browser chakra deferral edgehtml feedback future enhancements inline cache javascript jit compilation memory usage optimization performance sharedarraybuffer startup time try finally webassembly webassembly mvp windows 10
- Replies: 0
- Forum: Live RSS Feeds