%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEEIEEE Micro;2019;39;2;10.1109/MM.2019.2897677On the Spectre and Meltdown Processor Security VulnerabilitiesMark D. HillJon MastersParthasarathy RanganathanPaul TurnerJohn L. Hennessy
IEEE Micro91 March-April 201923910.1109/MM.2019.289767719
endstream
endobj
2 0 obj
<>stream
8;Z\76+37:%+J_%
lG&b]Q`Gs7<1!&Lc;N6%H<2f56Wt'CEG6>ghk(4uN?bYYA$ZW:`k13%ZMVp6rZj&3
C\)PogI;'aqo8dKi8j6[q_cYUMdZ4$h=&G:-&W\-SWBB%Mm):Z='sXn#<86i&iL.f
lOL4h>K1.
FN9_$GEf?4D=tcO>qb?s.:(T:/n"9[YoiAD)b9%1X;6?e.lhZ.=i]aQ0kTT@?,.'C
ouHa%EcSL:(B;!H_D8K!II;Kccg06%2(/\R.9;8'_?^erTgKiE'qn),GUL<5!"#af
U#M2Wi/=d__Ob(2R`ZV[47pp2PWe*&d$J.APgO9]I`s:Jj3)D-i!4<8?6Xl2Yu$G%Q-eP!=Jkob@2s)-N$kFVaA"kb
UV9-f3k"5E`LsY9h808aa_],s7@W6.HqA>&4P@@YfoR'`)RK#IZSP%#&6_.PS?L0Dc'q"/>KYL-msbhTuZg03C&bp\Ot@'NWdm;/*f9F$1EtRQm_/j
k0A3Gp+]kOT.8+)Die`]UMQf>OB1CmEM)JUu;W>$$F9`
NGk&+-CV3DMF5(8/q4OL].mfP.F_,,P"J?,l
endstream
endobj
3 0 obj
[/Indexed/DeviceRGB 255 4 0 R]
endobj
4 0 obj
<>stream
8;X]O>EqN@%''O_@%e@?J;%+8(9e>X=MR6S?i^YgA3=].HDXF.R$lIL@"pJ+EP(%0
b]6ajmNZn*!='OQZeQ^Y*,=]?C.B+\Ulg9dhD*"iC[;*=3`oP1[!S^)?1)IZ4dup`
E1r!/,*0[*9.aFIR2&b-C#soRZ7Dl%MLY\.?d>Mn
6%Q2oYfNRF$$+ON<+]RUJmC0InDZ4OTs0S!saG>GGKUlQ*Q?45:CI&4J'_2j$XKrcYp0n+Xl_nU*O(
l[$6Nn+Z_Nq0]s7hs]`XX1nZ8&94a\~>
endstream
endobj
5 0 obj
<>
endobj
6 0 obj
<>stream
htmL[eǟܻݚ;#22AEf6VX})}CZzRz
m؊e3E6fnd[fc`!
Cb4>g&vo;CDQ]Te헶f~{:* ܛgS5Q{BJEyPM
(tB)XG*4 )o`ɏ
g*<*q&4H2 i02,fث\ A2jz!$"$/B3,LN]U>>[9œtIjZoog7mר;*k]RGOk8Eg9ʫ-Mf{&%$qq{6nظ"I|a6 y*@{@P-< /H!YźV`w݃!+1\
seLc$d*0]ff>JnG~,SW)=8XХ˕0Vf<~4aY+:Z%+.Zڡw4Cg|~Oaj3w;Mb>)*\VxOW7ǵ?eRA6F2rI*yl&) ݇T*">UՎ"pC__'5̒os\g'&ɦp.